General
-
Target
https://cdn.discordapp.com/attachments/1242148692295684136/1243270923709321226/Planet_x_loader_.exe?ex=6650ddc7&is=664f8c47&hm=690b0b711604fd604df670014dcac01f69a6945635377232e8a41ea06c73c6d9&
-
Sample
240523-w9xqhscb49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1242148692295684136/1243270923709321226/Planet_x_loader_.exe?ex=6650ddc7&is=664f8c47&hm=690b0b711604fd604df670014dcac01f69a6945635377232e8a41ea06c73c6d9&
Resource
win11-20240426-en
Malware Config
Extracted
xworm
19.ip.gl.ply.gg:38173
-
Install_directory
%Userprofile%
-
install_file
Runtime Broker.exe
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1242148692295684136/1243270923709321226/Planet_x_loader_.exe?ex=6650ddc7&is=664f8c47&hm=690b0b711604fd604df670014dcac01f69a6945635377232e8a41ea06c73c6d9&
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-