General
-
Target
AntiCheat.exe
-
Size
65KB
-
Sample
240522-xtpkmsdb2x
-
MD5
ecf14cc5ff0424515577c9a2c5c3f778
-
SHA1
d91bdfe875552295fa07bf53da7ea3775b409006
-
SHA256
a1715115f4e541c7c69235aa8dc446857e5d6dbc1d4f28c7b4cf72122bad0248
-
SHA512
b57df6f7c05573dc0b612dacaf164486e19a0183683a06ef6c01a317bf98e16101cba1dd54c405e09ae0afc1868b42079a52cbbed2e8db8dcaf8f6f6661148b1
-
SSDEEP
1536:Vs4ew6fIj+QcTE80/uv2VV4bUOvCCj46oSpy9FfyWXaOe80R5z:OhQbueYbUZyy9F6WqOt0R5z
Behavioral task
behavioral1
Sample
AntiCheat.exe
Resource
win7-20240419-en
Malware Config
Extracted
xworm
weeks-deployment.gl.at.ply.gg:56058
-
Install_directory
%AppData%
-
install_file
System32.exe
Targets
-
-
Target
AntiCheat.exe
-
Size
65KB
-
MD5
ecf14cc5ff0424515577c9a2c5c3f778
-
SHA1
d91bdfe875552295fa07bf53da7ea3775b409006
-
SHA256
a1715115f4e541c7c69235aa8dc446857e5d6dbc1d4f28c7b4cf72122bad0248
-
SHA512
b57df6f7c05573dc0b612dacaf164486e19a0183683a06ef6c01a317bf98e16101cba1dd54c405e09ae0afc1868b42079a52cbbed2e8db8dcaf8f6f6661148b1
-
SSDEEP
1536:Vs4ew6fIj+QcTE80/uv2VV4bUOvCCj46oSpy9FfyWXaOe80R5z:OhQbueYbUZyy9F6WqOt0R5z
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-