General
-
Target
Ziadambtz.exe
-
Size
4.3MB
-
Sample
240615-et5yhsyeka
-
MD5
a715390b60339d3a56de38b271d837c5
-
SHA1
b5366c414d22e8d6a5d3c8c2546306877165e163
-
SHA256
fd43504919323178d05fa0c57b63eb316a512fdc366e20761f16c6e7e5c56904
-
SHA512
18b8a5d953b66eb1f7136569dbc27ff978f32973b554dedb4df387de07a0339a9bea15ce56ed655db63a4cfa735856d0bbaead7f0782c2cdaaec58558099cb32
-
SSDEEP
24576:qd4q8VYcHaiG9W6wKwD5RvrqeCeUSVJuC3RLCRb4RZQFC/P1WZ8SBs8SHUeNQaPc:E
Static task
static1
Malware Config
Extracted
xworm
5.0
XgMwB5Un881eApDQ
-
Install_directory
%LocalAppData%
-
install_file
rundll64.exe
-
pastebin_url
https://pastebin.com/raw/EiiXCJbn
Targets
-
-
Target
Ziadambtz.exe
-
Size
4.3MB
-
MD5
a715390b60339d3a56de38b271d837c5
-
SHA1
b5366c414d22e8d6a5d3c8c2546306877165e163
-
SHA256
fd43504919323178d05fa0c57b63eb316a512fdc366e20761f16c6e7e5c56904
-
SHA512
18b8a5d953b66eb1f7136569dbc27ff978f32973b554dedb4df387de07a0339a9bea15ce56ed655db63a4cfa735856d0bbaead7f0782c2cdaaec58558099cb32
-
SSDEEP
24576:qd4q8VYcHaiG9W6wKwD5RvrqeCeUSVJuC3RLCRb4RZQFC/P1WZ8SBs8SHUeNQaPc:E
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-