General

  • Target

    CS2 chit.exe

  • Size

    38KB

  • Sample

    250305-zeat2synt2

  • MD5

    a41bab9ece639b508a1da93605375bf0

  • SHA1

    a1a9a42a2eda376da5e3b7fdbd97f92961332a0b

  • SHA256

    14844195a11de498d4a6588656b14ec5c324ffd4d09e5e2f90d7e73231b0ad36

  • SHA512

    ca3be66c63600ba37ff761540b15a0366d7443f466f91a8a97c3b51901221bc3cb609bd78c30073a6c81a38602f62ce7bf9787a78e24cbe54c24935afcd44fd3

  • SSDEEP

    768:nXtP96PSVAWhtaxX+KNEAZFh911Ohh1FZ:NeSWWhcxX+KSOFh911OhvD

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

availability-billing.gl.at.ply.gg:43831

Mutex

jN0qPAFBa0wIzGHr

Attributes
  • Install_directory

    %AppData%

  • install_file

    Sandello.exe

aes.plain

Targets

    • Target

      CS2 chit.exe

    • Size

      38KB

    • MD5

      a41bab9ece639b508a1da93605375bf0

    • SHA1

      a1a9a42a2eda376da5e3b7fdbd97f92961332a0b

    • SHA256

      14844195a11de498d4a6588656b14ec5c324ffd4d09e5e2f90d7e73231b0ad36

    • SHA512

      ca3be66c63600ba37ff761540b15a0366d7443f466f91a8a97c3b51901221bc3cb609bd78c30073a6c81a38602f62ce7bf9787a78e24cbe54c24935afcd44fd3

    • SSDEEP

      768:nXtP96PSVAWhtaxX+KNEAZFh911Ohh1FZ:NeSWWhcxX+KSOFh911OhvD

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks