General
-
Target
32a333bb3c7ae28e1b197f94a4b16cc6f708b84e165ae55c3a109b57a3ed11c6.exe
-
Size
824KB
-
Sample
240615-brlkbatglb
-
MD5
4ab6e6b7f12cdc6be0aac6c4c867734a
-
SHA1
ffd5936fd106f37509e92bd2f0b8b7cd79252772
-
SHA256
32a333bb3c7ae28e1b197f94a4b16cc6f708b84e165ae55c3a109b57a3ed11c6
-
SHA512
55190d1c64154a37c82ed61d9b07599dc783a923b7c37d2420c41f5e7d2792748e8f0216105f17ac6dee74d463493b0322649a55f46cf367fd559534464a7946
-
SSDEEP
12288:35PD0rEQ+UVw+nl/7teXfzAZ5tM5ps3CHTyvRD6itpwC9qYNOePAJuQqJSP2ZczB:3570gQ+sRl/Rm8mp9zil4BP2Zc
Static task
static1
Behavioral task
behavioral1
Sample
32a333bb3c7ae28e1b197f94a4b16cc6f708b84e165ae55c3a109b57a3ed11c6.exe
Resource
win7-20240220-en
Malware Config
Extracted
xworm
inn-ht.gl.at.ply.gg:60031
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
32a333bb3c7ae28e1b197f94a4b16cc6f708b84e165ae55c3a109b57a3ed11c6.exe
-
Size
824KB
-
MD5
4ab6e6b7f12cdc6be0aac6c4c867734a
-
SHA1
ffd5936fd106f37509e92bd2f0b8b7cd79252772
-
SHA256
32a333bb3c7ae28e1b197f94a4b16cc6f708b84e165ae55c3a109b57a3ed11c6
-
SHA512
55190d1c64154a37c82ed61d9b07599dc783a923b7c37d2420c41f5e7d2792748e8f0216105f17ac6dee74d463493b0322649a55f46cf367fd559534464a7946
-
SSDEEP
12288:35PD0rEQ+UVw+nl/7teXfzAZ5tM5ps3CHTyvRD6itpwC9qYNOePAJuQqJSP2ZczB:3570gQ+sRl/Rm8mp9zil4BP2Zc
-
Detect Xworm Payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1