General
-
Target
проверка на читы.exe
-
Size
77KB
-
Sample
240529-sg6k6saa5t
-
MD5
01bc479b1b988b0183c676fa6f2a6d69
-
SHA1
e2837756d107c3514f4adcc25fa657e697f332eb
-
SHA256
2a27bff36479de7fdf902b02266bbc4c92a1a2a627d2f9d5d1c7f6f53b385712
-
SHA512
29bac859f7d4ea582d60b7c454684bf7999119666668b5d5721c5a717408d88ed3a19288ea2f4476b27fef0c8f6f6fafba0a4f9811445f5edf61e681a2aec05f
-
SSDEEP
1536:kXofT0eL/qHndN0DZKp+bCIA0NYZ6u2IOEar5r8PzUt:ObuMwD8+bfOnOnr56M
Behavioral task
behavioral1
Sample
проверка на читы.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
проверка на читы.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
19.ip.gl.ply.gg:2242
did-notices.gl.at.ply.gg:2242
autocl:123
-
Install_directory
%AppData%
-
install_file
rege000.exe
Targets
-
-
Target
проверка на читы.exe
-
Size
77KB
-
MD5
01bc479b1b988b0183c676fa6f2a6d69
-
SHA1
e2837756d107c3514f4adcc25fa657e697f332eb
-
SHA256
2a27bff36479de7fdf902b02266bbc4c92a1a2a627d2f9d5d1c7f6f53b385712
-
SHA512
29bac859f7d4ea582d60b7c454684bf7999119666668b5d5721c5a717408d88ed3a19288ea2f4476b27fef0c8f6f6fafba0a4f9811445f5edf61e681a2aec05f
-
SSDEEP
1536:kXofT0eL/qHndN0DZKp+bCIA0NYZ6u2IOEar5r8PzUt:ObuMwD8+bfOnOnr56M
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1