General
-
Target
test.exe
-
Size
73KB
-
Sample
231127-sb77tahc25
-
MD5
4bb4e54c4bbab869bb495cd8be9d1863
-
SHA1
3cc07ef3a842ffa9dc7a954e29ea2531d1488a24
-
SHA256
4ed78e72909f121e0fe00e8bbf84262ae1f83894d97dd6e083e7a25cbba28451
-
SHA512
c21614dc3d06a26927f11c9bac613ef0faab8590029899ca7991f64f53b28c25fbc2a6b3ff9e1691ab62ed2c0800c29951a9adad7aebf6a18c39326308ffc0bd
-
SSDEEP
1536:qqnoMosrXT3g9y+b3j9OGmi776yyODJOI3/QIe+:q5Fs3Oy+bT9r75yWOIP8+
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20231023-en
Malware Config
Extracted
xworm
report-printed.gl.at.ply.gg:29872
-
Install_directory
%Userprofile%
-
install_file
scvhost.exe
Targets
-
-
Target
test.exe
-
Size
73KB
-
MD5
4bb4e54c4bbab869bb495cd8be9d1863
-
SHA1
3cc07ef3a842ffa9dc7a954e29ea2531d1488a24
-
SHA256
4ed78e72909f121e0fe00e8bbf84262ae1f83894d97dd6e083e7a25cbba28451
-
SHA512
c21614dc3d06a26927f11c9bac613ef0faab8590029899ca7991f64f53b28c25fbc2a6b3ff9e1691ab62ed2c0800c29951a9adad7aebf6a18c39326308ffc0bd
-
SSDEEP
1536:qqnoMosrXT3g9y+b3j9OGmi776yyODJOI3/QIe+:q5Fs3Oy+bT9r75yWOIP8+
-
Detect Xworm Payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-