General
-
Target
MyMXEmYnFo.exe
-
Size
1.7MB
-
Sample
240525-qn96tsea6x
-
MD5
bd6610db3448a77c382fe18a28b8c119
-
SHA1
14698e2a813ab251599ab7cef89fb4fc712b02f2
-
SHA256
422c9953b7601910935fa9e7fbaf8beff70f96b67eeeb5cd2b66cf80603bff2e
-
SHA512
5bbb680726350b572f801dbd8bd92c2e44e5655bcefbdc19d9d0eaa452f6840b4a147e74d85c0b4e9001ec3236536c6dcb578fd63258ff6b9147663e1c74f25d
-
SSDEEP
24576:LTPLnvvPrLZux4xNOUTOl54cgqQRIbaCKFqSH43wq9DmefRl:FuUeQTebabfIfye
Static task
static1
Behavioral task
behavioral1
Sample
MyMXEmYnFo.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
wlms.exe
-
pastebin_url
https://pastebin.com/raw/Xuc6dzua
Targets
-
-
Target
MyMXEmYnFo.exe
-
Size
1.7MB
-
MD5
bd6610db3448a77c382fe18a28b8c119
-
SHA1
14698e2a813ab251599ab7cef89fb4fc712b02f2
-
SHA256
422c9953b7601910935fa9e7fbaf8beff70f96b67eeeb5cd2b66cf80603bff2e
-
SHA512
5bbb680726350b572f801dbd8bd92c2e44e5655bcefbdc19d9d0eaa452f6840b4a147e74d85c0b4e9001ec3236536c6dcb578fd63258ff6b9147663e1c74f25d
-
SSDEEP
24576:LTPLnvvPrLZux4xNOUTOl54cgqQRIbaCKFqSH43wq9DmefRl:FuUeQTebabfIfye
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-