General
-
Target
Nvidia.exe
-
Size
84KB
-
Sample
240524-pm2bvsbg64
-
MD5
b88324e748980de0822f27c5eaa05f89
-
SHA1
692801dae94dd076bc824f470d1fd1f094a2cb5e
-
SHA256
1e1ba4d49d3d060306fe2424d550864d5e68688a365377f23bb9a97750c5cc7d
-
SHA512
a40ad2477fb96829a2497f19ae02b79ba555010880db9abf5ab907501e148f7ff8e0f435b4d863bf435cdca0c8a5bf1148c5b7db71d8a9b2d283c244fcef1b60
-
SSDEEP
1536:McV+j6rwmKPK1HRmb0E3cbCwM6NOL6L9XOrvOYuFwfoubdS1EAd8IId:bErQRmbpMbrEq9XOjOYuFA3hgEA6IId
Behavioral task
behavioral1
Sample
Nvidia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Nvidia.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
210.246.215.36:5814
-
Install_directory
%ProgramData%
-
install_file
NVIDIA.exe
Targets
-
-
Target
Nvidia.exe
-
Size
84KB
-
MD5
b88324e748980de0822f27c5eaa05f89
-
SHA1
692801dae94dd076bc824f470d1fd1f094a2cb5e
-
SHA256
1e1ba4d49d3d060306fe2424d550864d5e68688a365377f23bb9a97750c5cc7d
-
SHA512
a40ad2477fb96829a2497f19ae02b79ba555010880db9abf5ab907501e148f7ff8e0f435b4d863bf435cdca0c8a5bf1148c5b7db71d8a9b2d283c244fcef1b60
-
SSDEEP
1536:McV+j6rwmKPK1HRmb0E3cbCwM6NOL6L9XOrvOYuFwfoubdS1EAd8IId:bErQRmbpMbrEq9XOjOYuFA3hgEA6IId
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-