General

  • Target

    Output.exe

  • Size

    2.0MB

  • Sample

    250307-xp3ayavrs7

  • MD5

    cb426d21428bc8468cf85d260f0b35b3

  • SHA1

    1c719bb607925916fc2446002f2c1f8ced2adf3f

  • SHA256

    b485b0b51b8307c750b3452a7965e538d9576f76ccab3b6e4a086201e854ef7f

  • SHA512

    23c2691731665a5d1ebc908a8b52f684c68fe7e9253dbedd59deae683d3ffe0b24db1d2f74a692e957e2b931558a662af38821d9412eb7428dab623fa2e30ac6

  • SSDEEP

    49152:K2ooOms+N4tFHLO9LCiGxyLp9UaqNU3skJVPA78Cj:K0K7LOwifLp9K1sVE8

Malware Config

Extracted

Family

xworm

Version

5.0

Mutex

qxXFT7Xfzgf1uMiL

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/MNJM1De2

aes.plain

Targets

    • Target

      Output.exe

    • Size

      2.0MB

    • MD5

      cb426d21428bc8468cf85d260f0b35b3

    • SHA1

      1c719bb607925916fc2446002f2c1f8ced2adf3f

    • SHA256

      b485b0b51b8307c750b3452a7965e538d9576f76ccab3b6e4a086201e854ef7f

    • SHA512

      23c2691731665a5d1ebc908a8b52f684c68fe7e9253dbedd59deae683d3ffe0b24db1d2f74a692e957e2b931558a662af38821d9412eb7428dab623fa2e30ac6

    • SSDEEP

      49152:K2ooOms+N4tFHLO9LCiGxyLp9UaqNU3skJVPA78Cj:K0K7LOwifLp9K1sVE8

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks