General
-
Target
ttG.exe
-
Size
319KB
-
Sample
240321-2ec1hsca95
-
MD5
3d8e131c16526bb4a2b103eae1ebb710
-
SHA1
544ac7db4642616d6c140d57e2da3d9964d4d9fa
-
SHA256
e9f625a7fef461cc7ead529e65de731d1c763ad0eb7dcb2e0ded65ee6a8cad8c
-
SHA512
e03238edce82944e9994e38f8dc70e442783b3c80cf6371e489df462a38a437387ff35e09214244cd1ae239a673d3812d2d4b622c73885e9c4927322996988e7
-
SSDEEP
6144:8dGKSNbQ+GIIIIIIIhIIIIIIIIIIIIIIIU:cq
Malware Config
Extracted
xworm
outside-wilson.gl.at.ply.gg:3991
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
ttG.exe
-
Size
319KB
-
MD5
3d8e131c16526bb4a2b103eae1ebb710
-
SHA1
544ac7db4642616d6c140d57e2da3d9964d4d9fa
-
SHA256
e9f625a7fef461cc7ead529e65de731d1c763ad0eb7dcb2e0ded65ee6a8cad8c
-
SHA512
e03238edce82944e9994e38f8dc70e442783b3c80cf6371e489df462a38a437387ff35e09214244cd1ae239a673d3812d2d4b622c73885e9c4927322996988e7
-
SSDEEP
6144:8dGKSNbQ+GIIIIIIIhIIIIIIIIIIIIIIIU:cq
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-