General
-
Target
Terraria.exe
-
Size
60KB
-
Sample
240607-yy6kdscf4s
-
MD5
26431ec9a1a79dabe8a67b64c005942e
-
SHA1
4f97b1ab1cec347bb27e6d49c791ca064c915c1f
-
SHA256
f5397c537fc606330bde4041b772c48e32170215def2a147a2c9f514c594aeab
-
SHA512
c95e03b07499b7cdd15e323d67b7a81bc1eb11cd6c6670a0d9a627cf119e4cc173f8ba2e00e65bb50cdf7d34316a54ab8d4ebb880eb7f9a71197dfe13678697a
-
SSDEEP
1536:Ke92V1xhC29ycp5+GvlYqibRmfF6uCOSJXfO38v:Ke92VM2cWwGvNibRvOSJfOsv
Behavioral task
behavioral1
Sample
Terraria.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Terraria.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
add-enlarge.gl.at.ply.gg:14520
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
Terraria.exe
-
Size
60KB
-
MD5
26431ec9a1a79dabe8a67b64c005942e
-
SHA1
4f97b1ab1cec347bb27e6d49c791ca064c915c1f
-
SHA256
f5397c537fc606330bde4041b772c48e32170215def2a147a2c9f514c594aeab
-
SHA512
c95e03b07499b7cdd15e323d67b7a81bc1eb11cd6c6670a0d9a627cf119e4cc173f8ba2e00e65bb50cdf7d34316a54ab8d4ebb880eb7f9a71197dfe13678697a
-
SSDEEP
1536:Ke92V1xhC29ycp5+GvlYqibRmfF6uCOSJXfO38v:Ke92VM2cWwGvNibRvOSJfOsv
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-