General

  • Target

    svchost.exe

  • Size

    69KB

  • Sample

    250304-ex772s1jx9

  • MD5

    35de149d3c81727ea4cce81a09f08581

  • SHA1

    dfa61238834b2f689822ece4f3b9f3c04f46cd0a

  • SHA256

    1803c1f48e626b2ec0e2620649d818ebf546bfe58dffddfbad224f20a8106ba0

  • SHA512

    dc7986c5849b6aa21ce27f0dac697f2a9d069fcd3652f1a50d1d50ab06985b6ea436458cc63dd16d7030be75db7e20c84e62bd05062b06a5ec18e2fca2b50152

  • SSDEEP

    1536:VmWuQglZi3V87QEw59b0fKNEehQCOWdZT1:V/gloEQEy9b00+COqN1

Score
10/10

Malware Config

Extracted

Family

xworm

C2

147.185.221.22:47930

127.0.0.1:47930

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      svchost.exe

    • Size

      69KB

    • MD5

      35de149d3c81727ea4cce81a09f08581

    • SHA1

      dfa61238834b2f689822ece4f3b9f3c04f46cd0a

    • SHA256

      1803c1f48e626b2ec0e2620649d818ebf546bfe58dffddfbad224f20a8106ba0

    • SHA512

      dc7986c5849b6aa21ce27f0dac697f2a9d069fcd3652f1a50d1d50ab06985b6ea436458cc63dd16d7030be75db7e20c84e62bd05062b06a5ec18e2fca2b50152

    • SSDEEP

      1536:VmWuQglZi3V87QEw59b0fKNEehQCOWdZT1:V/gloEQEy9b00+COqN1

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks