General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1241761661421883473/1251271497541091349/main.v1.exe?ex=666df8e4&is=666ca764&hm=9cd7d38f484c2133d8efbb50ddb02a9f24280d9102173df52a8573a75d479e85&
Resource
win10v2004-20240611-en
Malware Config
Extracted
xworm
gift-scientists.gl.at.ply.gg:20443
-
Install_directory
%AppData%
-
install_file
scvhost.exe
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1241761661421883473/1251271497541091349/main.v1.exe?ex=666df8e4&is=666ca764&hm=9cd7d38f484c2133d8efbb50ddb02a9f24280d9102173df52a8573a75d479e85&
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-