General
-
Target
https://mega.nz/folder/NS83jazB#MqObg2t6GAd90aKbpzj9Yw/file/UeckXbJD
-
Sample
240526-y7xc3sca24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/NS83jazB#MqObg2t6GAd90aKbpzj9Yw/file/UeckXbJD
Resource
win11-20240508-en
Malware Config
Extracted
xworm
3.0
127.0.0.1:15064
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6160780294:AAH_-K87IyiSSXGMezlxnoGclRVR1cY4gUk/sendMessage?chat_id=1562128485
Targets
-
-
Target
https://mega.nz/folder/NS83jazB#MqObg2t6GAd90aKbpzj9Yw/file/UeckXbJD
Score10/10-
Detect Xworm Payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1