General
-
Target
Xworm v5.6.1.exe
-
Size
45KB
-
Sample
240614-2kdt1ayfre
-
MD5
b419e672ce09e76bf687726eb487ac47
-
SHA1
082df415a432d8d0547bc6e73bbce82233a89990
-
SHA256
481bbd6737c0ce01a24654154b563a07caa49aa41d1743cc3ed0ef6d2bb7f172
-
SHA512
b77679b6a11b83cdf222af9b5d54832152eb11b4b16ca1c1a672a53accd5ae111c1ba8eb15e777d8fcc5719c6b7e67b2a816536c03b4a96e711ffe9715b853b7
-
SSDEEP
768:RIurlDweV3OOVbADM9W1v9NfgkBpuAuREcNcFylVvD4xeVhKfkvLbFEPa9pva76P:RIADweQKADMkV9GkSAcRaclZrOM/FJ9l
Behavioral task
behavioral1
Sample
Xworm v5.6.1.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
xworm
5.0
india-southampton.gl.at.ply.gg:20350
CejzkeFsbXIiTGtT
-
Install_directory
%ProgramData%
-
install_file
USB Update.exe
Targets
-
-
Target
Xworm v5.6.1.exe
-
Size
45KB
-
MD5
b419e672ce09e76bf687726eb487ac47
-
SHA1
082df415a432d8d0547bc6e73bbce82233a89990
-
SHA256
481bbd6737c0ce01a24654154b563a07caa49aa41d1743cc3ed0ef6d2bb7f172
-
SHA512
b77679b6a11b83cdf222af9b5d54832152eb11b4b16ca1c1a672a53accd5ae111c1ba8eb15e777d8fcc5719c6b7e67b2a816536c03b4a96e711ffe9715b853b7
-
SSDEEP
768:RIurlDweV3OOVbADM9W1v9NfgkBpuAuREcNcFylVvD4xeVhKfkvLbFEPa9pva76P:RIADweQKADMkV9GkSAcRaclZrOM/FJ9l
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-