General
-
Target
M5TTL.exe
-
Size
197KB
-
Sample
240614-29z4jatfrj
-
MD5
b044ba0b1001790087244d7d7b6e9452
-
SHA1
22572810c534a0268d60bc7a050f823394b5efdf
-
SHA256
4ec3fbfb426c8f24e10b05f3410f002520161f61c0d6ee0973ddc4ccf5e023be
-
SHA512
bcd6b66f65fef3f42e6200b95001bc347eaae077cad758b9a0fc16d1335f865a8ce6ef48aa9bbc335bd41be3ffcc533c1419f1b5192b1eeed3508da703d1b7f8
-
SSDEEP
3072:ct+jq1JJtO2MN1EALtYwx4XqLqejJ3uW4biLseLQGfFJgcmodkUkJ0:cKcJIN1EAr4SeBid/eed
Static task
static1
Behavioral task
behavioral1
Sample
M5TTL.exe
Resource
win10-20240404-en
Malware Config
Extracted
xworm
127.0.0.1:13576
edition-eat.gl.at.ply.gg:13576
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
M5TTL.exe
-
Size
197KB
-
MD5
b044ba0b1001790087244d7d7b6e9452
-
SHA1
22572810c534a0268d60bc7a050f823394b5efdf
-
SHA256
4ec3fbfb426c8f24e10b05f3410f002520161f61c0d6ee0973ddc4ccf5e023be
-
SHA512
bcd6b66f65fef3f42e6200b95001bc347eaae077cad758b9a0fc16d1335f865a8ce6ef48aa9bbc335bd41be3ffcc533c1419f1b5192b1eeed3508da703d1b7f8
-
SSDEEP
3072:ct+jq1JJtO2MN1EALtYwx4XqLqejJ3uW4biLseLQGfFJgcmodkUkJ0:cKcJIN1EAr4SeBid/eed
Score10/10-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-