General
-
Target
67d99e584b3b8ae9133a00e5edae2439.bin
-
Size
160KB
-
Sample
240329-cl5axafd84
-
MD5
67d99e584b3b8ae9133a00e5edae2439
-
SHA1
340d2d43fc698cf551f5cca59d8c468c0c23081c
-
SHA256
2e3efa1553c291ae2b2acd7fc0304b99d61f409fbf0979b7b7f5e852ef81833e
-
SHA512
997f15052cce0dee57b2acd8452275cfcc01c678ee07e91466aeb914b73abd78636a8d55be24a4bf18c2e4978ea8659e5959878a363d7321c9a95c27e97aabdb
-
SSDEEP
3072:NOt63aaqbxhlaOJeBz65/M6If+3Js+3JFkKeTno:NXqbDl8xBt25
Behavioral task
behavioral1
Sample
67d99e584b3b8ae9133a00e5edae2439.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67d99e584b3b8ae9133a00e5edae2439.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
head-formatting.gl.at.ply.gg:11437
-
Install_directory
%Temp%
-
install_file
svchost.exe
Targets
-
-
Target
67d99e584b3b8ae9133a00e5edae2439.bin
-
Size
160KB
-
MD5
67d99e584b3b8ae9133a00e5edae2439
-
SHA1
340d2d43fc698cf551f5cca59d8c468c0c23081c
-
SHA256
2e3efa1553c291ae2b2acd7fc0304b99d61f409fbf0979b7b7f5e852ef81833e
-
SHA512
997f15052cce0dee57b2acd8452275cfcc01c678ee07e91466aeb914b73abd78636a8d55be24a4bf18c2e4978ea8659e5959878a363d7321c9a95c27e97aabdb
-
SSDEEP
3072:NOt63aaqbxhlaOJeBz65/M6If+3Js+3JFkKeTno:NXqbDl8xBt25
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-