General

  • Target

    RedWareTempV3.exe

  • Size

    86KB

  • Sample

    250307-cz4arstjy9

  • MD5

    dd14ce42c869309959374b8497b8b8c6

  • SHA1

    3d6fbe7bdccb4d779e84ac058f8c7ec8fc3e623f

  • SHA256

    78286063f2e7de6b9d38075affdbfd0f24456eceefb4e86321298e71409a6a02

  • SHA512

    95975b34eac64834cffeba1322d3718afead0163cf11fb4362c12cb1d34beabc38cc4407619de98726cd977a212fed7002a2664b37ce105d07e8265776f47124

  • SSDEEP

    1536:gp+KuU1oVHPsbMJuguun/Gmf6WpFOfNAL78C4Mnh:g4TQotPsbsugR/GOzOfq/t1h

Score
10/10

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/KESYt2Qf

Targets

    • Target

      RedWareTempV3.exe

    • Size

      86KB

    • MD5

      dd14ce42c869309959374b8497b8b8c6

    • SHA1

      3d6fbe7bdccb4d779e84ac058f8c7ec8fc3e623f

    • SHA256

      78286063f2e7de6b9d38075affdbfd0f24456eceefb4e86321298e71409a6a02

    • SHA512

      95975b34eac64834cffeba1322d3718afead0163cf11fb4362c12cb1d34beabc38cc4407619de98726cd977a212fed7002a2664b37ce105d07e8265776f47124

    • SSDEEP

      1536:gp+KuU1oVHPsbMJuguun/Gmf6WpFOfNAL78C4Mnh:g4TQotPsbsugR/GOzOfq/t1h

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks