General

  • Target

    17c7d4a3d7d090646721f5a1326955c0c4471450bfb76fdeca9b256680da2e71.exe

  • Size

    394KB

  • Sample

    250305-cngydswkx3

  • MD5

    fc44a673893daac90d53e63d0f3cba69

  • SHA1

    38476f091d4d53e32abf92cb961f8df5782734cb

  • SHA256

    17c7d4a3d7d090646721f5a1326955c0c4471450bfb76fdeca9b256680da2e71

  • SHA512

    a247d42527e4933e874710fa905a4e248fa3cdc799b863635ebcb6afabcad63b4c61c643a6bd3bc80c242d80b01459517de3bcf4548a77832d19b3a5ba054378

  • SSDEEP

    12288:hQoqIEtLGnkEz0VgXVNX77gBjkgvSoitcOgvFwE0+fubk7IVcHMqXxTU9LiqVDRH:G

Malware Config

Extracted

Family

xworm

Version

5.0

C2

185.7.214.108:4411

185.7.214.54:4411

aes.plain

Targets

    • Target

      17c7d4a3d7d090646721f5a1326955c0c4471450bfb76fdeca9b256680da2e71.exe

    • Size

      394KB

    • MD5

      fc44a673893daac90d53e63d0f3cba69

    • SHA1

      38476f091d4d53e32abf92cb961f8df5782734cb

    • SHA256

      17c7d4a3d7d090646721f5a1326955c0c4471450bfb76fdeca9b256680da2e71

    • SHA512

      a247d42527e4933e874710fa905a4e248fa3cdc799b863635ebcb6afabcad63b4c61c643a6bd3bc80c242d80b01459517de3bcf4548a77832d19b3a5ba054378

    • SSDEEP

      12288:hQoqIEtLGnkEz0VgXVNX77gBjkgvSoitcOgvFwE0+fubk7IVcHMqXxTU9LiqVDRH:G

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks