General
-
Target
https://www.upload.ee/download/15657107/813ac1d2bfa81d7f177e/XWorm-V5.0.rar
-
Sample
240411-lbmgsage63
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.upload.ee/download/15657107/813ac1d2bfa81d7f177e/XWorm-V5.0.rar
Resource
win11-20240221-en
windows11-21h2-x64
24 signatures
1200 seconds
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:7000
Mutex
cYnFSQs0oL87TAxW
Attributes
-
install_file
USB.exe
aes.plain
Targets
-
-
Target
https://www.upload.ee/download/15657107/813ac1d2bfa81d7f177e/XWorm-V5.0.rar
Score10/10-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-