General

  • Target

    SynapseZ.exe

  • Size

    35KB

  • Sample

    250307-jkxyrsxkt2

  • MD5

    c471492c8eb22c02614f9b0d1ac5a911

  • SHA1

    76d06ec306f49d0f05fd00b9db64e4752af3e289

  • SHA256

    68cc399ac33200e625c1a1a89600b540cbca82b18539f2a6e11533c344de9438

  • SHA512

    ebf22a778d1d23c44d3ff4930bdc2b95abb3de5eaafa14199a40e52817817d8110ceaba92ecc23e3cc2def8e2084ccf1f24d087e5901478f289647f04cde56f4

  • SSDEEP

    768:jHs7Dzumj2frk7y1TxVP+sVFyw9bhO/hUy8L:jM7DzumnQSKFr9bhO/CxL

Malware Config

Extracted

Family

xworm

Version

5.0

C2

tax-fc.gl.at.ply.gg:47830

Mutex

NPbXxScl7vLavVVM

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    svchost.exe

aes.plain

Targets

    • Target

      SynapseZ.exe

    • Size

      35KB

    • MD5

      c471492c8eb22c02614f9b0d1ac5a911

    • SHA1

      76d06ec306f49d0f05fd00b9db64e4752af3e289

    • SHA256

      68cc399ac33200e625c1a1a89600b540cbca82b18539f2a6e11533c344de9438

    • SHA512

      ebf22a778d1d23c44d3ff4930bdc2b95abb3de5eaafa14199a40e52817817d8110ceaba92ecc23e3cc2def8e2084ccf1f24d087e5901478f289647f04cde56f4

    • SSDEEP

      768:jHs7Dzumj2frk7y1TxVP+sVFyw9bhO/hUy8L:jM7DzumnQSKFr9bhO/CxL

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks