General

  • Target

    maintest.exe

  • Size

    330KB

  • Sample

    250303-yl4v2axsfx

  • MD5

    99cdea5125309896c9086198db961e27

  • SHA1

    38bf9352dcd7b8ad0d6d69c91d0c5a4f61878ab4

  • SHA256

    0febbefd9e7941ff10fc777e9239e8fc10029d98ef76aaaa574469055d2c4153

  • SHA512

    d14980a66825259b45b60f4473793ece6d0a533229260e35b4feba1299a62da47128badf646d0c6f4ea3cc3edf86d7d8d4950654e275a36a7ec4495779e63f55

  • SSDEEP

    6144:5+3bubEQSgCvu+GIIIIIIIhIIIIIIIIIIIIIIIU:ebtd5v5

Score
10/10

Malware Config

Extracted

Family

xworm

C2

45.88.91.55:7813

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    steam-helper.exe

Targets

    • Target

      maintest.exe

    • Size

      330KB

    • MD5

      99cdea5125309896c9086198db961e27

    • SHA1

      38bf9352dcd7b8ad0d6d69c91d0c5a4f61878ab4

    • SHA256

      0febbefd9e7941ff10fc777e9239e8fc10029d98ef76aaaa574469055d2c4153

    • SHA512

      d14980a66825259b45b60f4473793ece6d0a533229260e35b4feba1299a62da47128badf646d0c6f4ea3cc3edf86d7d8d4950654e275a36a7ec4495779e63f55

    • SSDEEP

      6144:5+3bubEQSgCvu+GIIIIIIIhIIIIIIIIIIIIIIIU:ebtd5v5

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks