General
-
Target
SolaraBETA3.zip
-
Size
55.4MB
-
Sample
240522-vhbtashg57
-
MD5
3ef86eb8224edf981f24a2f429de888a
-
SHA1
fe0199be4fe0f3702459c30535492bdbfed2440a
-
SHA256
4e45f4d9791dfc23b25eabe6cc0c2e6d5590af67df744ce7f5dde4dc6581006c
-
SHA512
b82cf9ae2cb5ba4d0084a2c6305cda99a4828ffb29e1f861f32316d355717f9d497bc370f30d9c8cc23158e8918163aaf434eabecc40838cc8f0377b73bbfc1f
-
SSDEEP
786432:OxSM6Glea1yFeyRRCH3XQLtKGnHfj8UEfP2rdVsiUHetSK+0EA6hnZZcr47Aeo5Z:OxxZRyAQRQwQH9fP2YiU+tvqZZcxe/qB
Behavioral task
behavioral1
Sample
SolaraBETA3.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
SolaraBETA3.zip
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
SolaraBETA3.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
SolaraBETA3.zip
Resource
win11-20240508-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/cXrVe9uw
-
telegram
https://api.telegram.org/bot6979293307:AAEOPp5yyNk59nmm3T6LeHhjYWWOLjWSYdU/sendMessage?chat_id=1370207735
Targets
-
-
Target
SolaraBETA3.zip
-
Size
55.4MB
-
MD5
3ef86eb8224edf981f24a2f429de888a
-
SHA1
fe0199be4fe0f3702459c30535492bdbfed2440a
-
SHA256
4e45f4d9791dfc23b25eabe6cc0c2e6d5590af67df744ce7f5dde4dc6581006c
-
SHA512
b82cf9ae2cb5ba4d0084a2c6305cda99a4828ffb29e1f861f32316d355717f9d497bc370f30d9c8cc23158e8918163aaf434eabecc40838cc8f0377b73bbfc1f
-
SSDEEP
786432:OxSM6Glea1yFeyRRCH3XQLtKGnHfj8UEfP2rdVsiUHetSK+0EA6hnZZcr47Aeo5Z:OxxZRyAQRQwQH9fP2YiU+tvqZZcxe/qB
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-