General

  • Target

    5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59.exe

  • Size

    967KB

  • Sample

    240630-bjc8za1ekc

  • MD5

    437ab2592608e8c710d9165cff2bacae

  • SHA1

    935c5fe81f335ec3132c79b9f8e1e21c242a235d

  • SHA256

    5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59

  • SHA512

    4b4b0720428d184b1f6628227ce739c4b9bbdf91ee381893f8bdc295b83a7952c9bf371ab8a96f09e269b62a0358967ce3354e82a7523b1be86df5dab8b8d900

  • SSDEEP

    24576:SAHnh+eWsN3skA4RV1Hom2KXMmHageJJaYFp2x5:Vh+ZkldoPK8YageJAYY

Score
10/10

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:2887

mynegatobenna.ddns.net:2887

Attributes
  • install_file

    USB.exe

Targets

    • Target

      5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59.exe

    • Size

      967KB

    • MD5

      437ab2592608e8c710d9165cff2bacae

    • SHA1

      935c5fe81f335ec3132c79b9f8e1e21c242a235d

    • SHA256

      5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59

    • SHA512

      4b4b0720428d184b1f6628227ce739c4b9bbdf91ee381893f8bdc295b83a7952c9bf371ab8a96f09e269b62a0358967ce3354e82a7523b1be86df5dab8b8d900

    • SSDEEP

      24576:SAHnh+eWsN3skA4RV1Hom2KXMmHageJJaYFp2x5:Vh+ZkldoPK8YageJAYY

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Detects Windows executables referencing non-Windows User-Agents

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks