General
-
Target
Loader_UEFI.exe
-
Size
679KB
-
Sample
231006-f4x64ahc2w
-
MD5
c917837258e4556d08d1007a901e10e2
-
SHA1
033d5a327325f01252ae0ab387dddada6974a873
-
SHA256
830998a199250c7183288618febb35fd08a7848d3aae1cddb89c48d8be180b1a
-
SHA512
022faef413e99ae4175635e1eda70059fa05fd365ee71930fab27d98e5e376360ab27709ccdd19c8a9097055ae2a7e46381063a39813670d645e9b79be25d4f5
-
SSDEEP
12288:KqI9R0yf99LzhWjkRCFdNT9InralGCZ3ZvI/eLjX9qSs+B32O/ocOJMyPJGTlOzr:KHR0yfrzhWCqT4OQCxZg6jNLnm0oBiy9
Static task
static1
Behavioral task
behavioral1
Sample
Loader_UEFI.exe
Resource
win10-20230915-en
Malware Config
Extracted
xworm
3.1
Graxe239-61522.portmap.host:61522
-
install_file
RuntimeBroker.exe
Targets
-
-
Target
Loader_UEFI.exe
-
Size
679KB
-
MD5
c917837258e4556d08d1007a901e10e2
-
SHA1
033d5a327325f01252ae0ab387dddada6974a873
-
SHA256
830998a199250c7183288618febb35fd08a7848d3aae1cddb89c48d8be180b1a
-
SHA512
022faef413e99ae4175635e1eda70059fa05fd365ee71930fab27d98e5e376360ab27709ccdd19c8a9097055ae2a7e46381063a39813670d645e9b79be25d4f5
-
SSDEEP
12288:KqI9R0yf99LzhWjkRCFdNT9InralGCZ3ZvI/eLjX9qSs+B32O/ocOJMyPJGTlOzr:KHR0yfrzhWCqT4OQCxZg6jNLnm0oBiy9
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-