General

  • Target

    03032025_1237_Shipping_Documents.pdf_.bat.zip

  • Size

    34KB

  • Sample

    250303-pzsv9ax1ct

  • MD5

    febc0f234ce35b1fd50f309af95b090b

  • SHA1

    5f69c97fd53a282d1be8b97ae3fba266e9ab6b66

  • SHA256

    4758b9130f78fd67643d92f9adde34516a5b757f20807edb7fbf6f3ee143f76e

  • SHA512

    1a3d28fd174decce79970180092526871109d5fad2cad4103b15b75d206640b567fc5d2c5e5c295505ea27834d0b39dd6100d0e1ebd48b715163804b5a758b22

  • SSDEEP

    768:H9J8WpQGIq9GjlP/qWs0GwOOYvg+UIHh6jjmNxsdT2+7JE/:dnpQGm3HGwivUIHQj86yGK

Malware Config

Extracted

Family

xworm

Version

5.0

C2

expresswealthz.duckdns.org:3911

Mutex

RzkxMatWHp9NDD4H

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      Shipping_Documents.pdf_.bat

    • Size

      64KB

    • MD5

      eac68a6120674bd90a20752d09d126e8

    • SHA1

      9f73c48c6a5d177b67ca3f984caca601d6540427

    • SHA256

      fbb07a7f02f9957564b487f7a893751f3059ae53dbcd0bdf5f176ca7be69096b

    • SHA512

      f3240d2ecf309a5b1db1566b9fbff5ee7c946a26ff441327cbebb0ce1f3089e0a02934c14f164d59e934c585132413af38e4b6b389577eb61e1e7f590cb23248

    • SSDEEP

      1536:vOYBZkbmEKUgXEXzICKUnF85J6ygoASfj3Hlbjeq5d6d01jK:vZQHfe5J6JQbn5dl1jK

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks