General

  • Target

    RealtekAudioDriverInstall.exe

  • Size

    34KB

  • Sample

    250307-zrhenawwew

  • MD5

    c08e200e9b6243e0af193b2427897b24

  • SHA1

    6253cce0f986fab471cb8d877b21773cac468e2e

  • SHA256

    a03d5af3b1cf34ca72c56d567f78153eae51bb0c29ba8c045c503be0723dffe3

  • SHA512

    6d0f18a531128497abf1c947daca06a7ab8f0f242f31fc4a6f73dba0e336337068f0eb86ea2e675fa4bbbc4e3994503ea00f393beda43dc281e5ae53f2abc53e

  • SSDEEP

    768:KHqIHRXYazPNhzIgtoFk9Fy9YBOjhJ/VcP:KhxX9z0gtowFy9YBOjXtcP

Malware Config

Extracted

Family

xworm

Version

5.0

C2

24.243.20.84:59024

Mutex

2qfPdx4LIVlTG6G5

Attributes
  • Install_directory

    %AppData%

  • install_file

    Realtek Audio Driver.exe

aes.plain

Targets

    • Target

      RealtekAudioDriverInstall.exe

    • Size

      34KB

    • MD5

      c08e200e9b6243e0af193b2427897b24

    • SHA1

      6253cce0f986fab471cb8d877b21773cac468e2e

    • SHA256

      a03d5af3b1cf34ca72c56d567f78153eae51bb0c29ba8c045c503be0723dffe3

    • SHA512

      6d0f18a531128497abf1c947daca06a7ab8f0f242f31fc4a6f73dba0e336337068f0eb86ea2e675fa4bbbc4e3994503ea00f393beda43dc281e5ae53f2abc53e

    • SSDEEP

      768:KHqIHRXYazPNhzIgtoFk9Fy9YBOjhJ/VcP:KhxX9z0gtowFy9YBOjXtcP

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks