General
-
Target
1c1d169d6719f3c05e3ea0e8c91d26b53524588b8ffcc64b273eeec359eb51a4
-
Size
56KB
-
Sample
240614-x2kxeswgpk
-
MD5
f68cad23c9bc135471958c4a3d4d8fa9
-
SHA1
c5194b77d6fa5e9e87ec138be44384531dc7e076
-
SHA256
1c1d169d6719f3c05e3ea0e8c91d26b53524588b8ffcc64b273eeec359eb51a4
-
SHA512
72b34dbac8c3bbfa3156059a1e48fd81e6683a367b01de972153472aadcfcba513a60d8dab4af06f8bc35d96421734f6d981e72a9d6192b08049272582b8db1a
-
SSDEEP
1536:VHxjJE4u4y96411QQh0Shu/bNgl4e6Axk0MrOYgpM:VRjJM910b/bNgmwxkPrOYg6
Behavioral task
behavioral1
Sample
1c1d169d6719f3c05e3ea0e8c91d26b53524588b8ffcc64b273eeec359eb51a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c1d169d6719f3c05e3ea0e8c91d26b53524588b8ffcc64b273eeec359eb51a4.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
-
Install_directory
%ProgramData%
-
install_file
$77svchost.exe
-
telegram
https://api.telegram.org/bot6094198209:AAGtbuJi6hBqVBpkxn3UzVsVOtCJjMn1cjE
Targets
-
-
Target
1c1d169d6719f3c05e3ea0e8c91d26b53524588b8ffcc64b273eeec359eb51a4
-
Size
56KB
-
MD5
f68cad23c9bc135471958c4a3d4d8fa9
-
SHA1
c5194b77d6fa5e9e87ec138be44384531dc7e076
-
SHA256
1c1d169d6719f3c05e3ea0e8c91d26b53524588b8ffcc64b273eeec359eb51a4
-
SHA512
72b34dbac8c3bbfa3156059a1e48fd81e6683a367b01de972153472aadcfcba513a60d8dab4af06f8bc35d96421734f6d981e72a9d6192b08049272582b8db1a
-
SSDEEP
1536:VHxjJE4u4y96411QQh0Shu/bNgl4e6Axk0MrOYgpM:VRjJM910b/bNgmwxkPrOYg6
Score10/10-
Detect Xworm Payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects executables using Telegram Chat Bot
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-