General

  • Target

    wowowowow2.exe

  • Size

    44KB

  • Sample

    250406-p6j7paywcy

  • MD5

    377db59ee7098a2f4a13144ea0740b37

  • SHA1

    91a404a6a8958b21143ab8ca3b6800f3808c5174

  • SHA256

    8599d28e49d682737dc92f6839802a8d9f616c06db22680a5dba4886477347c3

  • SHA512

    eb6faf18d15accde08b1b43fb45baab994fa3bf976b4085b43447e41f8e7b20f04527b4c0a907515f3822510b69bfc304ea20799faeb8575a4014e12b78e79cc

  • SSDEEP

    768:yO36H7BEIliviyzwmLI8SBVKSbFEPa9b9k6tOFhOzbKSP:ytBE9cmOBVrFd9pk6tOF0XP

Score
10/10

Malware Config

Extracted

Family

xworm

Version

5.0

C2

Javv-46764.portmap.host:46764

Mutex

WTB5on1a3f4SOs4L

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Targets

    • Target

      wowowowow2.exe

    • Size

      44KB

    • MD5

      377db59ee7098a2f4a13144ea0740b37

    • SHA1

      91a404a6a8958b21143ab8ca3b6800f3808c5174

    • SHA256

      8599d28e49d682737dc92f6839802a8d9f616c06db22680a5dba4886477347c3

    • SHA512

      eb6faf18d15accde08b1b43fb45baab994fa3bf976b4085b43447e41f8e7b20f04527b4c0a907515f3822510b69bfc304ea20799faeb8575a4014e12b78e79cc

    • SSDEEP

      768:yO36H7BEIliviyzwmLI8SBVKSbFEPa9b9k6tOFhOzbKSP:ytBE9cmOBVrFd9pk6tOF0XP

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks