General
-
Target
читы.exe
-
Size
105KB
-
Sample
240529-pj3qhseh53
-
MD5
7c4229f56dd1abf353b7615e099cb3a8
-
SHA1
f1a2545b0d9b1f686d456c60fcd87c3c4ee93d08
-
SHA256
2d0936804bfa8aedd998cbfb27485f1816222f17921d14705e390c5622b232ad
-
SHA512
e961a5a7b44fdfc0cbdedbb48320afa5097c8ff5f7d1880069e4120ee0bfe2d0642d3b7b7977c815c6f96b9c0f66028f26a2a0bfcdef5cca363269dff780af41
-
SSDEEP
3072:ydqfxEp09Xt1m+b1pNkLP+uOoo9wmfAn1W0cgte8:ydq5F9HbvNkK4oPAng0ct
Behavioral task
behavioral1
Sample
читы.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
читы.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
advertise-located.gl.at.ply.gg:54921
19.ip.gl.ply.gg:54921
XWorm V5.2:123
-
Install_directory
%AppData%
-
install_file
Delta.exe
Targets
-
-
Target
читы.exe
-
Size
105KB
-
MD5
7c4229f56dd1abf353b7615e099cb3a8
-
SHA1
f1a2545b0d9b1f686d456c60fcd87c3c4ee93d08
-
SHA256
2d0936804bfa8aedd998cbfb27485f1816222f17921d14705e390c5622b232ad
-
SHA512
e961a5a7b44fdfc0cbdedbb48320afa5097c8ff5f7d1880069e4120ee0bfe2d0642d3b7b7977c815c6f96b9c0f66028f26a2a0bfcdef5cca363269dff780af41
-
SSDEEP
3072:ydqfxEp09Xt1m+b1pNkLP+uOoo9wmfAn1W0cgte8:ydq5F9HbvNkK4oPAng0ct
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-