General

  • Target

    Algorithm_Converter_Arab-you (2).exe

  • Size

    497KB

  • Sample

    250307-lsv59aypy6

  • MD5

    19ab3a28f430378150bb4a7afc2a5a5e

  • SHA1

    24f62552fb20cb81fb2b3a1521f698b9b7f58848

  • SHA256

    e0e8dc309849f9da9ff2aaf5394a267748b5a5c0009ace4d2873726c80ed0eec

  • SHA512

    9781a3b465176fa88d7883bad64661672472bc77e42fc145d92524f86bf11eec57be11ab885de01539085cff292fb0051bc2bf59366b8437c0d788caf1d9d900

  • SSDEEP

    12288:PGMnkN1TDTvX7ym4vw+8ixjvrWem7kC+8:nG1TDTvLVkrrTm

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.0

C2

3skr.uncofig.com:9999

Mutex

f5nPSEGIk3s9ZJvj

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7942324376:AAFz5Z-GdKIj1CePZyqIUmvNWOymMRw8Lmk/sendMessage?chat_id=2078478344

aes.plain

Targets

    • Target

      Algorithm_Converter_Arab-you (2).exe

    • Size

      497KB

    • MD5

      19ab3a28f430378150bb4a7afc2a5a5e

    • SHA1

      24f62552fb20cb81fb2b3a1521f698b9b7f58848

    • SHA256

      e0e8dc309849f9da9ff2aaf5394a267748b5a5c0009ace4d2873726c80ed0eec

    • SHA512

      9781a3b465176fa88d7883bad64661672472bc77e42fc145d92524f86bf11eec57be11ab885de01539085cff292fb0051bc2bf59366b8437c0d788caf1d9d900

    • SSDEEP

      12288:PGMnkN1TDTvX7ym4vw+8ixjvrWem7kC+8:nG1TDTvLVkrrTm

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks