General

  • Target

    2025-04-06_95f047ded8adcfe2e511a1fc028203b1_frostygoop_ghostlocker_sliver_snatch

  • Size

    5.6MB

  • Sample

    250406-magqksynv8

  • MD5

    95f047ded8adcfe2e511a1fc028203b1

  • SHA1

    529f9ad2ad9d52b8f21a61b31e89348f7ff24e2d

  • SHA256

    57292046a9da4973018df26bb6c5090662e751928f0037ee9314f6fda9b99c69

  • SHA512

    812faa588aa8842ab2657ad919fdd08960470789d0a319c803c3236a799997647145bccffbcda6a8d3f1d94604ffd58b5591293586adbb113937611fc6b3fe64

  • SSDEEP

    49152:XKgvYa1iBLUrZlTb5LLQjpBh7Fg2g3KtBI7DSXXiTopYYrIZJqxsJRjyt5eZB:BYa1+I1x53A7FpBI7uXXaPYrXs4eZ

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:9000

45.134.39.20:9000

Mutex

oV8zKY7m1pKloRzQ

Attributes
  • install_file

    USB.exe

aes.plain
1
819HMbfXIglsOlLgyj/7cQ==

Targets

    • Target

      2025-04-06_95f047ded8adcfe2e511a1fc028203b1_frostygoop_ghostlocker_sliver_snatch

    • Size

      5.6MB

    • MD5

      95f047ded8adcfe2e511a1fc028203b1

    • SHA1

      529f9ad2ad9d52b8f21a61b31e89348f7ff24e2d

    • SHA256

      57292046a9da4973018df26bb6c5090662e751928f0037ee9314f6fda9b99c69

    • SHA512

      812faa588aa8842ab2657ad919fdd08960470789d0a319c803c3236a799997647145bccffbcda6a8d3f1d94604ffd58b5591293586adbb113937611fc6b3fe64

    • SSDEEP

      49152:XKgvYa1iBLUrZlTb5LLQjpBh7Fg2g3KtBI7DSXXiTopYYrIZJqxsJRjyt5eZB:BYa1+I1x53A7FpBI7uXXaPYrXs4eZ

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.