General

  • Target

    packetmod_Slayed.exe

  • Size

    165KB

  • Sample

    250308-kwfpasvkt6

  • MD5

    b3a67a3d8b73d78d67783ad607c7b234

  • SHA1

    6efe61f75ef3431a482ab3a2c40d5f18cc9cbdd7

  • SHA256

    ec777010e19736917e17e8e6983f6d23942d8f1addd26aacd2e6f2b489124295

  • SHA512

    ad52ad3c9c834b56a19284a86adffcb83f49adf686e8752bcb8996c483a741bec7c177dbbdde971ec91b03c6b04fbade5d01cfe7a4640dfa8b326b4b2de1a413

  • SSDEEP

    3072:JVhXhEVHUyhskpPba/JOp7nVYBz65/M6If+3Js+3JFkKeTnt:nhX2HUGppPbfYxBt25

Score
10/10

Malware Config

Extracted

Family

xworm

C2

80.76.49.27:8891

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    sys-32.exe

Targets

    • Target

      packetmod_Slayed.exe

    • Size

      165KB

    • MD5

      b3a67a3d8b73d78d67783ad607c7b234

    • SHA1

      6efe61f75ef3431a482ab3a2c40d5f18cc9cbdd7

    • SHA256

      ec777010e19736917e17e8e6983f6d23942d8f1addd26aacd2e6f2b489124295

    • SHA512

      ad52ad3c9c834b56a19284a86adffcb83f49adf686e8752bcb8996c483a741bec7c177dbbdde971ec91b03c6b04fbade5d01cfe7a4640dfa8b326b4b2de1a413

    • SSDEEP

      3072:JVhXhEVHUyhskpPba/JOp7nVYBz65/M6If+3Js+3JFkKeTnt:nhX2HUGppPbfYxBt25

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks