General
-
Target
426d8c689450dc785db30bf449c1385d.bin
-
Size
65KB
-
Sample
240615-bq9whstgjg
-
MD5
426d8c689450dc785db30bf449c1385d
-
SHA1
5e09bd7b26294fe480197ef68531435ee43dfb42
-
SHA256
7ff89a7a820c063a4dd52de612e16611bb330fa4b513f08141584a281ef844e6
-
SHA512
25b1227b100aff4adda558c65de3587196252edfc4bd24bdd8c8d2ad78ddc4cd695cf61d3af2361f187d447a72052251ec5227eb3f8192e5f1014929e4764b36
-
SSDEEP
1536:IOO1QqIU2xWuviSwhhnJrH+qbmuHyBtO6YOLbdRbU:rlq9AaSs9NHRbmx4OHd1U
Behavioral task
behavioral1
Sample
426d8c689450dc785db30bf449c1385d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
426d8c689450dc785db30bf449c1385d.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
svchost.exe
Targets
-
-
Target
426d8c689450dc785db30bf449c1385d.bin
-
Size
65KB
-
MD5
426d8c689450dc785db30bf449c1385d
-
SHA1
5e09bd7b26294fe480197ef68531435ee43dfb42
-
SHA256
7ff89a7a820c063a4dd52de612e16611bb330fa4b513f08141584a281ef844e6
-
SHA512
25b1227b100aff4adda558c65de3587196252edfc4bd24bdd8c8d2ad78ddc4cd695cf61d3af2361f187d447a72052251ec5227eb3f8192e5f1014929e4764b36
-
SSDEEP
1536:IOO1QqIU2xWuviSwhhnJrH+qbmuHyBtO6YOLbdRbU:rlq9AaSs9NHRbmx4OHd1U
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-