General
-
Target
2b6c7b2d1d3096ba9c01a29d3089a02f5bd3d14bda47d20ef2cc11196f5697ad
-
Size
575KB
-
Sample
240421-bv8h9afg5z
-
MD5
cc8b1158ddbeb156968a6110a58e0403
-
SHA1
8dc4308b025ae703f989030da8b0ae97b2f771c4
-
SHA256
2b6c7b2d1d3096ba9c01a29d3089a02f5bd3d14bda47d20ef2cc11196f5697ad
-
SHA512
eb5f2b9361dd319fcaa644035433bfc93b61e18c6b3677f71becea4b7a9bc7651d1fadeafb42845779fd7a6b66833e8684788e14159893c4ca5fe2e2dbf4ef29
-
SSDEEP
12288:UCQjgAtAHM+vetZxF5EWry8AJGy0wT+t1bsVKoqmqvClWZxk5:U5ZWs+OZVEWry8AFUb2ymqvCiO
Static task
static1
Behavioral task
behavioral1
Sample
2b6c7b2d1d3096ba9c01a29d3089a02f5bd3d14bda47d20ef2cc11196f5697ad.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2b6c7b2d1d3096ba9c01a29d3089a02f5bd3d14bda47d20ef2cc11196f5697ad.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
xworm
127.0.0.1:26998
reports-identifying.gl.at.ply.gg:26998
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
2b6c7b2d1d3096ba9c01a29d3089a02f5bd3d14bda47d20ef2cc11196f5697ad
-
Size
575KB
-
MD5
cc8b1158ddbeb156968a6110a58e0403
-
SHA1
8dc4308b025ae703f989030da8b0ae97b2f771c4
-
SHA256
2b6c7b2d1d3096ba9c01a29d3089a02f5bd3d14bda47d20ef2cc11196f5697ad
-
SHA512
eb5f2b9361dd319fcaa644035433bfc93b61e18c6b3677f71becea4b7a9bc7651d1fadeafb42845779fd7a6b66833e8684788e14159893c4ca5fe2e2dbf4ef29
-
SSDEEP
12288:UCQjgAtAHM+vetZxF5EWry8AJGy0wT+t1bsVKoqmqvClWZxk5:U5ZWs+OZVEWry8AFUb2ymqvCiO
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-