Resubmissions

05/03/2025, 22:03

250305-1yq6ta1mv5 3

05/03/2025, 21:51

250305-1qneys1jz8 10

General

  • Target

    file

  • Size

    7KB

  • Sample

    250305-1qneys1jz8

  • MD5

    cb37a07989c743fff42af9d822533933

  • SHA1

    3bca2e7d9ecb4ab0f4c3ec3a75a80b7d6041bd43

  • SHA256

    e6e9207db9da7a8a626f739314dac6a2426698603793b99902104050cf6b4292

  • SHA512

    ef783e2cd94f3637b8ce08452f9e2107c923b99e5371740c3caa2e957eb529c3fa65b481a837fd917394a125a6ba83f3166d3e543c2dbe59463174aedca31a20

  • SSDEEP

    96:PNybXaotqEb0EZ2W87IfrI2+nomtaaGBj0YhNM7UlNbOG9zrYbXnSvN4Yzueh8tR:PN2x2BeM2+1DGlM7UrbOInYTnSlZyLN

Malware Config

Extracted

Family

xworm

Version

5.0

C2

137.184.74.73:5000

Mutex

Y2rnj2CSRObOXXLb

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    System.exe

aes.plain

Targets

    • Target

      file

    • Size

      7KB

    • MD5

      cb37a07989c743fff42af9d822533933

    • SHA1

      3bca2e7d9ecb4ab0f4c3ec3a75a80b7d6041bd43

    • SHA256

      e6e9207db9da7a8a626f739314dac6a2426698603793b99902104050cf6b4292

    • SHA512

      ef783e2cd94f3637b8ce08452f9e2107c923b99e5371740c3caa2e957eb529c3fa65b481a837fd917394a125a6ba83f3166d3e543c2dbe59463174aedca31a20

    • SSDEEP

      96:PNybXaotqEb0EZ2W87IfrI2+nomtaaGBj0YhNM7UlNbOG9zrYbXnSvN4Yzueh8tR:PN2x2BeM2+1DGlM7UrbOInYTnSlZyLN

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Drops startup file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks