General
-
Target
Minecraft.exe
-
Size
61KB
-
Sample
240531-xv9xzaah22
-
MD5
ebaf38949ddaf75042b5680707117745
-
SHA1
b1e45ef043bd2dbf4d2c3511bc3a8b742f4f237e
-
SHA256
bdb400432a963d7557a75735f5ece80ec87720f49d074bbfc9b29b67a454c0b8
-
SHA512
34997d945013294d4c3fa42dc0ad99435fd6848184cf4a2dcdfa35b2c1aa849f4d4d96267663c38c7a805548b92bba973cb28bcb136377b06335cad2695ab3c1
-
SSDEEP
1536:pH1CZ+08luVQamx7SXrb1k8J++86JaOtkEIdT:pH1C9qaU+rbiEPaOtkrdT
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
RtkAudUService64.exe
-
pastebin_url
https://pastebin.com/raw/U86ZFi0F
Targets
-
-
Target
Minecraft.exe
-
Size
61KB
-
MD5
ebaf38949ddaf75042b5680707117745
-
SHA1
b1e45ef043bd2dbf4d2c3511bc3a8b742f4f237e
-
SHA256
bdb400432a963d7557a75735f5ece80ec87720f49d074bbfc9b29b67a454c0b8
-
SHA512
34997d945013294d4c3fa42dc0ad99435fd6848184cf4a2dcdfa35b2c1aa849f4d4d96267663c38c7a805548b92bba973cb28bcb136377b06335cad2695ab3c1
-
SSDEEP
1536:pH1CZ+08luVQamx7SXrb1k8J++86JaOtkEIdT:pH1C9qaU+rbiEPaOtkrdT
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-