General

  • Target

    BootstrapperNe.exe

  • Size

    3.0MB

  • Sample

    250305-b2e6aavte1

  • MD5

    2db7ca48c2862fe3c8ffefb50b7f975b

  • SHA1

    09e61b2d5d3876fc0c8030e075745f89289fb876

  • SHA256

    ceb91d9b072597d9adad98e6b7ffc3a6593d362ded0fbe8d1bab4cb8460d3cdf

  • SHA512

    d9e937061fc8eabb75068d78863f7045e626ba26261a526bb59b0e2fb0010d38b520c19fad9e8bfc67ee943c4669866970728ae006afd73986fd4af0a3e866fa

  • SSDEEP

    49152:ZirspxuZcd9LG5IUNKbFHEwJSRmM/ZUqz2xZM4REPG5B/V1LUuOfW7eVbEJqMEuU:ZigpxuqdFG5dNKJdJSRmM/uqSxZM4RE+

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:5467

google-rocks.gl.at.ply.gg:5467

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      BootstrapperNe.exe

    • Size

      3.0MB

    • MD5

      2db7ca48c2862fe3c8ffefb50b7f975b

    • SHA1

      09e61b2d5d3876fc0c8030e075745f89289fb876

    • SHA256

      ceb91d9b072597d9adad98e6b7ffc3a6593d362ded0fbe8d1bab4cb8460d3cdf

    • SHA512

      d9e937061fc8eabb75068d78863f7045e626ba26261a526bb59b0e2fb0010d38b520c19fad9e8bfc67ee943c4669866970728ae006afd73986fd4af0a3e866fa

    • SSDEEP

      49152:ZirspxuZcd9LG5IUNKbFHEwJSRmM/ZUqz2xZM4REPG5B/V1LUuOfW7eVbEJqMEuU:ZigpxuqdFG5dNKJdJSRmM/uqSxZM4RE+

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks