General
-
Target
c7bd91207ac565f362c9a9702bcf5cb278b414e8a5489087431a448011d32f47.exe
-
Size
75.8MB
-
Sample
231231-qnbm9sddb7
-
MD5
864fec7c56d3a3fd0de982a049dc247a
-
SHA1
ef6240916847124235a523bf867c91a944e1c65b
-
SHA256
c7bd91207ac565f362c9a9702bcf5cb278b414e8a5489087431a448011d32f47
-
SHA512
452acfeda622d2948cdab3820fe2e688f91b7a11da5d97e34f04e5c350d60aff069d5620a9961cd92876291a65511a83a6ab05619d5c3e8aa0280d3cd374335b
-
SSDEEP
1572864:tERVE3V33f9SIdRMYxBvc+bOv6UEiQ/0SWyI+jHC7BX:tEgllfxBvTUOjddON
Static task
static1
Behavioral task
behavioral1
Sample
c7bd91207ac565f362c9a9702bcf5cb278b414e8a5489087431a448011d32f47.exe
Resource
win7-20231215-en
Malware Config
Extracted
xworm
3.1
-
Install_directory
%ProgramData%
-
install_file
SecurityHealthSystray.exe
-
telegram
https://api.telegram.org/bot5370417334:AAEZrEauqhTNZInhZ9_-SaapQJIi0hIvjJU
Extracted
asyncrat
Default
尺vcΕ贼2C伊R开tΗKTتDmF尺
-
c2_url_file
https://fvia.app/ip2.txt
-
delay
5
-
install
false
-
install_folder
%Windows%
Targets
-
-
Target
c7bd91207ac565f362c9a9702bcf5cb278b414e8a5489087431a448011d32f47.exe
-
Size
75.8MB
-
MD5
864fec7c56d3a3fd0de982a049dc247a
-
SHA1
ef6240916847124235a523bf867c91a944e1c65b
-
SHA256
c7bd91207ac565f362c9a9702bcf5cb278b414e8a5489087431a448011d32f47
-
SHA512
452acfeda622d2948cdab3820fe2e688f91b7a11da5d97e34f04e5c350d60aff069d5620a9961cd92876291a65511a83a6ab05619d5c3e8aa0280d3cd374335b
-
SSDEEP
1572864:tERVE3V33f9SIdRMYxBvc+bOv6UEiQ/0SWyI+jHC7BX:tEgllfxBvTUOjddON
-
Detect Xworm Payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1