General
-
Target
2024-06-15_acffc1f0283e48c3be63bdaef1b841e3_hiddentear
-
Size
165KB
-
Sample
240615-a3vfxsshlh
-
MD5
acffc1f0283e48c3be63bdaef1b841e3
-
SHA1
317e5b38615a5b33e90d4c9a9e5648afdf3d97fe
-
SHA256
5a368fa901666c714335f1503850c0376f4be1821493f4c4e234f42a882a8db5
-
SHA512
47e019e385e503bfc160bef1a7b3aeb395e2bf5c442b72d3b136672e42da9e0409b3daa810a168f8718bebed264c6cc0199d3ae3741cd3895777dafd73ec287d
-
SSDEEP
3072:jgKBlnkuqXbXctK5OQhbQlM+lmsolAIrRuw+mqv9j1MWLQb:EjHbpQe+lDAA
Behavioral task
behavioral1
Sample
2024-06-15_acffc1f0283e48c3be63bdaef1b841e3_hiddentear.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-15_acffc1f0283e48c3be63bdaef1b841e3_hiddentear.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
194.26.192.246:7000
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Targets
-
-
Target
2024-06-15_acffc1f0283e48c3be63bdaef1b841e3_hiddentear
-
Size
165KB
-
MD5
acffc1f0283e48c3be63bdaef1b841e3
-
SHA1
317e5b38615a5b33e90d4c9a9e5648afdf3d97fe
-
SHA256
5a368fa901666c714335f1503850c0376f4be1821493f4c4e234f42a882a8db5
-
SHA512
47e019e385e503bfc160bef1a7b3aeb395e2bf5c442b72d3b136672e42da9e0409b3daa810a168f8718bebed264c6cc0199d3ae3741cd3895777dafd73ec287d
-
SSDEEP
3072:jgKBlnkuqXbXctK5OQhbQlM+lmsolAIrRuw+mqv9j1MWLQb:EjHbpQe+lDAA
Score10/10-
Detect Xworm Payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-