General
-
Target
AVPGameProtect.exe
-
Size
2.0MB
-
Sample
231016-c2l49sbc4v
-
MD5
ae8302cc3743e0cf591462ff99323b48
-
SHA1
a22a1376581511399d1ba6c19b9adf353b9a8deb
-
SHA256
65c98bb84510c6ef706ab17912ecaafcc433b49a7c6c10efb02cfdfe4cb0ba47
-
SHA512
e27cf857ca75c5f2e07e15c9024255ad820ef958e2600a227b33949f70dafbd9a0159adc1146899a6c48e20a5627e161ca4aac74077a9206a5b4d8329f9ae392
-
SSDEEP
49152:CQIG3ye106F68OmKm9lsACXfgWmG+HYRTu:0QABLqsAUDmG+5
Static task
static1
Behavioral task
behavioral1
Sample
AVPGameProtect.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
AVPGameProtect.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
xworm
5.0
fee-harmful.gl.at.ply.gg:41934
9khqHSoKPdVOFMVm
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
AVPGameProtect.exe
-
Size
2.0MB
-
MD5
ae8302cc3743e0cf591462ff99323b48
-
SHA1
a22a1376581511399d1ba6c19b9adf353b9a8deb
-
SHA256
65c98bb84510c6ef706ab17912ecaafcc433b49a7c6c10efb02cfdfe4cb0ba47
-
SHA512
e27cf857ca75c5f2e07e15c9024255ad820ef958e2600a227b33949f70dafbd9a0159adc1146899a6c48e20a5627e161ca4aac74077a9206a5b4d8329f9ae392
-
SSDEEP
49152:CQIG3ye106F68OmKm9lsACXfgWmG+HYRTu:0QABLqsAUDmG+5
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Sets desktop wallpaper using registry
-