General

  • Target

    UPS tracking details.arj

  • Size

    547KB

  • Sample

    250303-rmv6yszwaw

  • MD5

    f06dc9482c3a9e96587cd54f815c186d

  • SHA1

    cfa50c835f5cca27d57394ec92eec1f42c2af7a7

  • SHA256

    88c769b0619d975edf0db0023e38ed2c7865ed1e1ae1e998b975dfa8733315bc

  • SHA512

    f99010ac1deb0747165c83f362c32b8f8c4dbe4fbbbd25d8be8537d5c4e843f08ec1895672670d55df3d173047e632f94bf940d1a11ce984d76e2c09845bd39c

  • SSDEEP

    12288:mgYb7P6CRi6lL4DUdMwRpQKRFWxnM87Udd8AP8hcsmsLl:mgwGCom6wRuKRFKM87UJv2l

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

56TvElZMbqDoRvU7

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      UPS tracking details.exe

    • Size

      851KB

    • MD5

      28badf3eb1aa6ce975fee86e6ec1dc14

    • SHA1

      8f19c7dbdde308e463b0412d73ea7083b1bcc816

    • SHA256

      7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e

    • SHA512

      eb5da8590065d4a289c75c4f3d3124ecc854398a7e846ddb2c2aec5d136817e393ce8881c539b08d0f3eee79e56ccab5dbe0e57054eccbe97769189cc73f356e

    • SSDEEP

      12288:vWMnQ1Kfk7AEYQCJSsFlsIQfYl2N3qWkj9d/qArFK6eNXwC94EBTR+:uj7AEYQCQaKbA63+jPqAUNXjBBT0

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks