General
-
Target
Xpub updated.exe
-
Size
1.0MB
-
Sample
231111-sv4czaab26
-
MD5
25c2bf24f3b8f423a4181c7f67ae50b5
-
SHA1
2190d3faa60c34fc4b9a237bba9abac14fc28021
-
SHA256
713970f3fdf9d2d5a7819c8a84731f331277c7c75f1b88b60c22fabc9f2e2159
-
SHA512
2f5d0e84db21fe25d3c3e5c647f12b8b292411682514d19d55ccfa0491b8d279872a1866e2af685b870a752be84cf2f1b56f40c37afb3e2cf1135fbbc4fe9cf7
-
SSDEEP
24576:nyhVzcJg9bxWnM8/uGu7Gzw/Fe552DydluAqYOn+YRD331:yHxl8/q7JFxglVqLnBD331
Static task
static1
Behavioral task
behavioral1
Sample
Xpub updated.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Xpub updated.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
xworm
5.0
6dscd9NcNiKn8WNo
-
Install_directory
%AppData%
-
install_file
$k.exe
-
pastebin_url
https://pastebin.com/raw/s2R3Fsug
Targets
-
-
Target
Xpub updated.exe
-
Size
1.0MB
-
MD5
25c2bf24f3b8f423a4181c7f67ae50b5
-
SHA1
2190d3faa60c34fc4b9a237bba9abac14fc28021
-
SHA256
713970f3fdf9d2d5a7819c8a84731f331277c7c75f1b88b60c22fabc9f2e2159
-
SHA512
2f5d0e84db21fe25d3c3e5c647f12b8b292411682514d19d55ccfa0491b8d279872a1866e2af685b870a752be84cf2f1b56f40c37afb3e2cf1135fbbc4fe9cf7
-
SSDEEP
24576:nyhVzcJg9bxWnM8/uGu7Gzw/Fe552DydluAqYOn+YRD331:yHxl8/q7JFxglVqLnBD331
Score10/10-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1