General

  • Target

    2025-03-06_7c47ea730d0d9201dfb31d80c4bf16ce_hiddentear

  • Size

    192KB

  • Sample

    250306-cqpq1svxhv

  • MD5

    7c47ea730d0d9201dfb31d80c4bf16ce

  • SHA1

    85de8ad640c8b2c5e186f4bdf1819870afeac2b8

  • SHA256

    a6efc36d12cb0bbeff1748eefb46f2ad6df30cc736a0afe1337f3b97e85443f2

  • SHA512

    5c708b9a251263de8f2c6619f0515fd3ea3bc1b8be837b778223983cb97f182c36bd7332dbd79c701793038b805b304033a858f104d283f400b3af90bca5237d

  • SSDEEP

    6144:jmpsdZuN2iRzjMelR74/gU8G9CbGCrmsE/93ffk8q98R77Hg3c05yH+lDAA:jmpsdZuN2iRzjBlR74/gU8G9CbGCrmsz

Malware Config

Targets

    • Target

      2025-03-06_7c47ea730d0d9201dfb31d80c4bf16ce_hiddentear

    • Size

      192KB

    • MD5

      7c47ea730d0d9201dfb31d80c4bf16ce

    • SHA1

      85de8ad640c8b2c5e186f4bdf1819870afeac2b8

    • SHA256

      a6efc36d12cb0bbeff1748eefb46f2ad6df30cc736a0afe1337f3b97e85443f2

    • SHA512

      5c708b9a251263de8f2c6619f0515fd3ea3bc1b8be837b778223983cb97f182c36bd7332dbd79c701793038b805b304033a858f104d283f400b3af90bca5237d

    • SSDEEP

      6144:jmpsdZuN2iRzjMelR74/gU8G9CbGCrmsE/93ffk8q98R77Hg3c05yH+lDAA:jmpsdZuN2iRzjBlR74/gU8G9CbGCrmsz

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks