General
-
Target
Explorador de.exe
-
Size
108KB
-
Sample
231013-s7g1hadc26
-
MD5
d4f3bbcc3c886f9f169f2d3f8abbf69c
-
SHA1
b6554c01a9d6dfede49e0f228579706f5d3d9593
-
SHA256
65d36cb2c9766bbf7cfe33a94f52e0b9b4f2e3670349579a9da25cec57e028b0
-
SHA512
31a5902408425b78d45ef0133048c213c7f0021f92030a8c728a291cb9a317dbbf9858fa5b2b65c692ece199807209b88d1bebab871fc8080c8aa8d1ca11b876
-
SSDEEP
1536:sR8ow8VV+5XBHagarDciuTv+es4WdWHBzdTNNrp6HXdkjDcLikGbe:4VV0X1atbuDHvFfOHM1b
Static task
static1
Behavioral task
behavioral1
Sample
Explorador de.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
xworm
5.0
mode-apollo.gl.at.ply.gg:59320
427aeRoFiPrbgiZo
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Targets
-
-
Target
Explorador de.exe
-
Size
108KB
-
MD5
d4f3bbcc3c886f9f169f2d3f8abbf69c
-
SHA1
b6554c01a9d6dfede49e0f228579706f5d3d9593
-
SHA256
65d36cb2c9766bbf7cfe33a94f52e0b9b4f2e3670349579a9da25cec57e028b0
-
SHA512
31a5902408425b78d45ef0133048c213c7f0021f92030a8c728a291cb9a317dbbf9858fa5b2b65c692ece199807209b88d1bebab871fc8080c8aa8d1ca11b876
-
SSDEEP
1536:sR8ow8VV+5XBHagarDciuTv+es4WdWHBzdTNNrp6HXdkjDcLikGbe:4VV0X1atbuDHvFfOHM1b
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-