General

  • Target

    awb_post_dhl_delivery_documents_05_03_2025_00000000000250.bat

  • Size

    64KB

  • Sample

    250305-m6bt7swzdx

  • MD5

    cf57d5eb699a380c9c16a80380ba4430

  • SHA1

    f619f0e136046b263597254cac874843669b6f5d

  • SHA256

    71dfb99a8659fc7f33fb09bda152cc14aa4d42266c3691b61045a7083eaca8d6

  • SHA512

    f2d558bc38a0863e442d362416700a0e678a8c9d8e9c9fb6d9e6123e8b8f3e6bde740cb51e432396577609b01c0783fcb7a748cc60fd097823ae4241dcada51f

  • SSDEEP

    1536:UM8QNuOVNv9V/AoMwQ0l/ds8RtZkbmEKUgXEXzICKUnFWvjpi:UMnTVNVVqJU/dUHfKjpi

Malware Config

Extracted

Family

xworm

Version

5.0

C2

tripplebanks.duckdns.org:3399

Mutex

bppouzbV7pFA6n72

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      awb_post_dhl_delivery_documents_05_03_2025_00000000000250.bat

    • Size

      64KB

    • MD5

      cf57d5eb699a380c9c16a80380ba4430

    • SHA1

      f619f0e136046b263597254cac874843669b6f5d

    • SHA256

      71dfb99a8659fc7f33fb09bda152cc14aa4d42266c3691b61045a7083eaca8d6

    • SHA512

      f2d558bc38a0863e442d362416700a0e678a8c9d8e9c9fb6d9e6123e8b8f3e6bde740cb51e432396577609b01c0783fcb7a748cc60fd097823ae4241dcada51f

    • SSDEEP

      1536:UM8QNuOVNv9V/AoMwQ0l/ds8RtZkbmEKUgXEXzICKUnFWvjpi:UMnTVNVVqJU/dUHfKjpi

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks