General
-
Target
Aimware.exe
-
Size
16.3MB
-
Sample
240424-kkcs9sgb6x
-
MD5
5a72ded081c8c7c91b1d184373738090
-
SHA1
9896303af03baa31492cbbb69b6e56270f3f8788
-
SHA256
16dab8d574832e8f2d6c7e301b5546982fa1290177e921611a252aa7ffa8ce96
-
SHA512
9447b4adf3c00a652f4f7ab42fdaf05a10907cd0d4b2e55f0c0f450e668c6629b1ba72c0c5e7941018485855a8677284326e3b7b512c68099165b7c13dbd273e
-
SSDEEP
393216:G0OSkfUxwHprJEZx/efi8ddpARG2cNPZJJNp7w9XsR:REUxwJrJO/e68ddaRYNPZz7wcR
Static task
static1
Behavioral task
behavioral1
Sample
Aimware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Aimware.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
Aimware.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Aimware.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Aimware.exe
Resource
win11-20240412-en
Malware Config
Extracted
xworm
student-grocery.gl.at.ply.gg:29486
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Aimware.exe
-
Size
16.3MB
-
MD5
5a72ded081c8c7c91b1d184373738090
-
SHA1
9896303af03baa31492cbbb69b6e56270f3f8788
-
SHA256
16dab8d574832e8f2d6c7e301b5546982fa1290177e921611a252aa7ffa8ce96
-
SHA512
9447b4adf3c00a652f4f7ab42fdaf05a10907cd0d4b2e55f0c0f450e668c6629b1ba72c0c5e7941018485855a8677284326e3b7b512c68099165b7c13dbd273e
-
SSDEEP
393216:G0OSkfUxwHprJEZx/efi8ddpARG2cNPZJJNp7w9XsR:REUxwJrJO/e68ddaRYNPZz7wcR
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-