General
-
Target
svchost.exe
-
Size
45KB
-
Sample
240608-v4lwdsdh3t
-
MD5
eb83e5875b331ecdf33090ea48621c8a
-
SHA1
45a855c317e8373cd955df8dd48b60f11b6d0869
-
SHA256
7a1af5a32471faac266e840be96ccce6afd1d1763554d409d59fdf4c453d407f
-
SHA512
bf169387a9610b6a57d6fe006b6526a9a50a9a5e993236418df9bf1ca5da44e069aef7769c354965be948affeecec2d594f08a75dddaebb532458fed0da8a4ad
-
SSDEEP
768:VyK0gdhOEykDe9Y/gx4T9nEcNc1hlVvD4xeVhKfkvLbFEPa9pvG6iOChSzjif4M:VyKrAkDeO1Ra/lZrOM/FJ9NG6iOCMegM
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
5.0
pa-nitrogen.gl.at.ply.gg:62957
uBSYttj1y6tsldI6
-
Install_directory
%Temp%
-
install_file
svchost.exe
Targets
-
-
Target
svchost.exe
-
Size
45KB
-
MD5
eb83e5875b331ecdf33090ea48621c8a
-
SHA1
45a855c317e8373cd955df8dd48b60f11b6d0869
-
SHA256
7a1af5a32471faac266e840be96ccce6afd1d1763554d409d59fdf4c453d407f
-
SHA512
bf169387a9610b6a57d6fe006b6526a9a50a9a5e993236418df9bf1ca5da44e069aef7769c354965be948affeecec2d594f08a75dddaebb532458fed0da8a4ad
-
SSDEEP
768:VyK0gdhOEykDe9Y/gx4T9nEcNc1hlVvD4xeVhKfkvLbFEPa9pvG6iOChSzjif4M:VyKrAkDeO1Ra/lZrOM/FJ9NG6iOCMegM
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-