General

  • Target

    BootStrapper1.exe

  • Size

    82KB

  • Sample

    250406-qkyzds1ry6

  • MD5

    0e053daa7f33031dee7bd642b9e53802

  • SHA1

    11ef2691bc84a1d85c773bc75075255236b53b9d

  • SHA256

    d60e0b54eaa7ee119c1303a61746b13e72dbb342feb113b2cfbec2853599fc80

  • SHA512

    693d729bf88dd6814ef4c27fa92bc685fc9ded8e3829d9a02581e075a370abdd83206f4f974773891d2253c1f9d31174176ecf1168527c23da88cf8c62794466

  • SSDEEP

    1536:H6Pys4EMbdO+PVqqtQ0f9dJYB1MbqCbb+tx6xvfZ8dOxaKmeD:HLJLbNqqL/61MbqQ+uvh+OxaKm4

Score
10/10

Malware Config

Extracted

Family

xworm

C2

147.185.221.26:16031

Attributes
  • Install_directory

    %AppData%

  • install_file

    Test.exe

Targets

    • Target

      BootStrapper1.exe

    • Size

      82KB

    • MD5

      0e053daa7f33031dee7bd642b9e53802

    • SHA1

      11ef2691bc84a1d85c773bc75075255236b53b9d

    • SHA256

      d60e0b54eaa7ee119c1303a61746b13e72dbb342feb113b2cfbec2853599fc80

    • SHA512

      693d729bf88dd6814ef4c27fa92bc685fc9ded8e3829d9a02581e075a370abdd83206f4f974773891d2253c1f9d31174176ecf1168527c23da88cf8c62794466

    • SSDEEP

      1536:H6Pys4EMbdO+PVqqtQ0f9dJYB1MbqCbb+tx6xvfZ8dOxaKmeD:HLJLbNqqL/61MbqQ+uvh+OxaKm4

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks