General

  • Target

    https://cdn.discordapp.com/attachments/1337991571500568716/1347929751221833809/TESTT.exe?ex=67cd9ce8&is=67cc4b68&hm=ddb1e26b0afd306f4ffaf8a5ab670be3407a8bb8f599ebd5896c9466c18de40c&

  • Sample

    250308-q6gl8sxzcs

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %port%

  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/cSnNDAPb

Targets

    • Target

      https://cdn.discordapp.com/attachments/1337991571500568716/1347929751221833809/TESTT.exe?ex=67cd9ce8&is=67cc4b68&hm=ddb1e26b0afd306f4ffaf8a5ab670be3407a8bb8f599ebd5896c9466c18de40c&

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks