General

  • Target

    a2bb213407059b3e41a8da86d35297f38dad86efd6251e97bcee362432ada01d.exe

  • Size

    52KB

  • Sample

    250305-dt217axl13

  • MD5

    6bb94a005e193fe609e46701bc6a6818

  • SHA1

    04c039891a23352a6e7e638cfb804bd95119a2dd

  • SHA256

    a2bb213407059b3e41a8da86d35297f38dad86efd6251e97bcee362432ada01d

  • SHA512

    ca245f4f37f8e053715ce7d23603570906e43ac791a3c1feca53ebc2b005d38960efe8272c0e8f8b79549841f3a43fe8bc617311ef5b53d2a318788ec15497aa

  • SSDEEP

    1536:aQbZ5d9CaW5ewwsDRmC4+bG8i3552CBFOWzfZ:559BW4aVmC4+bG555vOWLZ

Malware Config

Extracted

Family

xworm

C2

147.185.221.22:47930

127.0.0.1:47930

147.185.221.22:47930:47930

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Targets

    • Target

      a2bb213407059b3e41a8da86d35297f38dad86efd6251e97bcee362432ada01d.exe

    • Size

      52KB

    • MD5

      6bb94a005e193fe609e46701bc6a6818

    • SHA1

      04c039891a23352a6e7e638cfb804bd95119a2dd

    • SHA256

      a2bb213407059b3e41a8da86d35297f38dad86efd6251e97bcee362432ada01d

    • SHA512

      ca245f4f37f8e053715ce7d23603570906e43ac791a3c1feca53ebc2b005d38960efe8272c0e8f8b79549841f3a43fe8bc617311ef5b53d2a318788ec15497aa

    • SSDEEP

      1536:aQbZ5d9CaW5ewwsDRmC4+bG8i3552CBFOWzfZ:559BW4aVmC4+bG555vOWLZ

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks