General

  • Target

    2025-04-06_95f047ded8adcfe2e511a1fc028203b1_frostygoop_ghostlocker_sliver_snatch

  • Size

    5.6MB

  • Sample

    250406-l7t7hawvf1

  • MD5

    95f047ded8adcfe2e511a1fc028203b1

  • SHA1

    529f9ad2ad9d52b8f21a61b31e89348f7ff24e2d

  • SHA256

    57292046a9da4973018df26bb6c5090662e751928f0037ee9314f6fda9b99c69

  • SHA512

    812faa588aa8842ab2657ad919fdd08960470789d0a319c803c3236a799997647145bccffbcda6a8d3f1d94604ffd58b5591293586adbb113937611fc6b3fe64

  • SSDEEP

    49152:XKgvYa1iBLUrZlTb5LLQjpBh7Fg2g3KtBI7DSXXiTopYYrIZJqxsJRjyt5eZB:BYa1+I1x53A7FpBI7uXXaPYrXs4eZ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:9000

45.134.39.20:9000

Mutex

oV8zKY7m1pKloRzQ

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      2025-04-06_95f047ded8adcfe2e511a1fc028203b1_frostygoop_ghostlocker_sliver_snatch

    • Size

      5.6MB

    • MD5

      95f047ded8adcfe2e511a1fc028203b1

    • SHA1

      529f9ad2ad9d52b8f21a61b31e89348f7ff24e2d

    • SHA256

      57292046a9da4973018df26bb6c5090662e751928f0037ee9314f6fda9b99c69

    • SHA512

      812faa588aa8842ab2657ad919fdd08960470789d0a319c803c3236a799997647145bccffbcda6a8d3f1d94604ffd58b5591293586adbb113937611fc6b3fe64

    • SSDEEP

      49152:XKgvYa1iBLUrZlTb5LLQjpBh7Fg2g3KtBI7DSXXiTopYYrIZJqxsJRjyt5eZB:BYa1+I1x53A7FpBI7uXXaPYrXs4eZ

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks