General
-
Target
23456789876543456789087654.exe
-
Size
7.0MB
-
Sample
240609-n69a5sba47
-
MD5
efd8b7a33283182f7578c6305ebbe0ec
-
SHA1
8f266741e264931d5fd8fcffe558e802d0b30c41
-
SHA256
25ecbcbfbf71ced8d240cd6d9823af4dd9efc18bc0596f8a9e163d24a4d1079a
-
SHA512
6b0a2d0861bfe08c1a88b1742ffb2b33d7b24e8460f34f1077a2eaf49b3a4c6115fe6d6e39321b0ad7163490f1cf9b3431fbb3b5729f2c3445defee357037d5c
-
SSDEEP
196608:H04LGVORbRIn26AJjHw8tybCYTqE5zFMgVCK:H04LGV8I26AW8tlsFMN
Static task
static1
Behavioral task
behavioral1
Sample
23456789876543456789087654.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
5.0
VoQgi7cuiO7Ae7H2
-
Install_directory
%AppData%
-
install_file
Dllhost.exe
-
pastebin_url
https://pastebin.com/raw/pw1j2xqz
Targets
-
-
Target
23456789876543456789087654.exe
-
Size
7.0MB
-
MD5
efd8b7a33283182f7578c6305ebbe0ec
-
SHA1
8f266741e264931d5fd8fcffe558e802d0b30c41
-
SHA256
25ecbcbfbf71ced8d240cd6d9823af4dd9efc18bc0596f8a9e163d24a4d1079a
-
SHA512
6b0a2d0861bfe08c1a88b1742ffb2b33d7b24e8460f34f1077a2eaf49b3a4c6115fe6d6e39321b0ad7163490f1cf9b3431fbb3b5729f2c3445defee357037d5c
-
SSDEEP
196608:H04LGVORbRIn26AJjHw8tybCYTqE5zFMgVCK:H04LGV8I26AW8tlsFMN
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-