General
-
Target
8d2faf1c3a857566f516c28da34b9479.exe
-
Size
627KB
-
Sample
240428-wgzz6sde3w
-
MD5
8d2faf1c3a857566f516c28da34b9479
-
SHA1
6151cc6fe9097e07676b8e7dca4057d4be292f44
-
SHA256
93f357d221fc7f72bec7195e11c8a00b9e128448850a88ca66c8cc95fa47272f
-
SHA512
42c3908b63b7b5960c53b11f34e8b42efa361107491236730d30dc258857006d0e7078d3c529fddbe2c44ffad1fc3ee181de01b51dc2e52e5fc38c43d6672420
-
SSDEEP
12288:RgKJTegcva42lE21vVHEMsAi17CYcX685uQa5ro+sFUXPhuExaMpxfBJUw/:47a44E29Z1aCYcluI+ft
Static task
static1
Behavioral task
behavioral1
Sample
8d2faf1c3a857566f516c28da34b9479.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d2faf1c3a857566f516c28da34b9479.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
91.92.252.220:7000
41.199.23.195:7000
saveclinetsforme68465454711991.publicvm.com:7000
bBT8anvIxhxDFmkf
-
Install_directory
%AppData%
-
install_file
explorer.exe
-
telegram
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672
Targets
-
-
Target
8d2faf1c3a857566f516c28da34b9479.exe
-
Size
627KB
-
MD5
8d2faf1c3a857566f516c28da34b9479
-
SHA1
6151cc6fe9097e07676b8e7dca4057d4be292f44
-
SHA256
93f357d221fc7f72bec7195e11c8a00b9e128448850a88ca66c8cc95fa47272f
-
SHA512
42c3908b63b7b5960c53b11f34e8b42efa361107491236730d30dc258857006d0e7078d3c529fddbe2c44ffad1fc3ee181de01b51dc2e52e5fc38c43d6672420
-
SSDEEP
12288:RgKJTegcva42lE21vVHEMsAi17CYcX685uQa5ro+sFUXPhuExaMpxfBJUw/:47a44E29Z1aCYcluI+ft
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1