General
-
Target
Expensive 3.1.exe
-
Size
60KB
-
Sample
240526-sym56abc2w
-
MD5
a66624abb377e5ff52d4d2ae2707aca2
-
SHA1
a8bcdcaa2536996637e19827d2753e55bba45a28
-
SHA256
eb75a771291082654ce1c0ef9feb1bf6cd30da8b85b1e342df0bd3b9af35a3b8
-
SHA512
ec24aad17f3febb434f6c2f8c371ff0bba486abe9e7768c55f8ca766bb0363791b8a991945795277170a57a64f431a1c5f70a7d4acc4b7d878e9e983aafe26d1
-
SSDEEP
1536:4ptathcJHAxzcA0VzP5k3O+bB3JcSnGSq67Oy7m/:YoPcJVK++b9JcqOyM
Behavioral task
behavioral1
Sample
Expensive 3.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Expensive 3.1.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
loss-winners.gl.at.ply.gg:61007
-
Install_directory
%AppData%
-
install_file
Expensive 3.1.exe
Targets
-
-
Target
Expensive 3.1.exe
-
Size
60KB
-
MD5
a66624abb377e5ff52d4d2ae2707aca2
-
SHA1
a8bcdcaa2536996637e19827d2753e55bba45a28
-
SHA256
eb75a771291082654ce1c0ef9feb1bf6cd30da8b85b1e342df0bd3b9af35a3b8
-
SHA512
ec24aad17f3febb434f6c2f8c371ff0bba486abe9e7768c55f8ca766bb0363791b8a991945795277170a57a64f431a1c5f70a7d4acc4b7d878e9e983aafe26d1
-
SSDEEP
1536:4ptathcJHAxzcA0VzP5k3O+bB3JcSnGSq67Oy7m/:YoPcJVK++b9JcqOyM
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-