General
-
Target
c382a9b8a942145bb9cc963c5c1ab8fd53161fb9ac543e25477d41092acb668f.exe
-
Size
4.2MB
-
Sample
240405-b462sahe45
-
MD5
a24a8287aafe88f86ee58bde969db33c
-
SHA1
36ef8fac732c5208fe6e5b2fb767ac1dcc836eb7
-
SHA256
c382a9b8a942145bb9cc963c5c1ab8fd53161fb9ac543e25477d41092acb668f
-
SHA512
af0a085ff94faeabdb82b1011f13998daac68615b425528d9dab1d909a1302c01518060e24f27af9dcf0f1b9bcf60cecee71e3f8bc0980d6adc69ff28a8ce802
-
SSDEEP
98304:yQnUGAC+hqc8lqvdzw2nsNKYYURyc9JirsN4JzmUP:y+Tn2qcUzp6UYeJRCxP
Behavioral task
behavioral1
Sample
c382a9b8a942145bb9cc963c5c1ab8fd53161fb9ac543e25477d41092acb668f.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:5050
character-acquisitions.gl.at.ply.gg:5050
mwMjRzRXiqvikaW3
-
install_file
USB.exe
Targets
-
-
Target
c382a9b8a942145bb9cc963c5c1ab8fd53161fb9ac543e25477d41092acb668f.exe
-
Size
4.2MB
-
MD5
a24a8287aafe88f86ee58bde969db33c
-
SHA1
36ef8fac732c5208fe6e5b2fb767ac1dcc836eb7
-
SHA256
c382a9b8a942145bb9cc963c5c1ab8fd53161fb9ac543e25477d41092acb668f
-
SHA512
af0a085ff94faeabdb82b1011f13998daac68615b425528d9dab1d909a1302c01518060e24f27af9dcf0f1b9bcf60cecee71e3f8bc0980d6adc69ff28a8ce802
-
SSDEEP
98304:yQnUGAC+hqc8lqvdzw2nsNKYYURyc9JirsN4JzmUP:y+Tn2qcUzp6UYeJRCxP
-
Detect Xworm Payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects executables packed with Themida
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-