General
-
Target
oxyinstaller.exe
-
Size
67KB
-
Sample
240620-ph79ls1ekr
-
MD5
2b274de1ba95b66b41fd57ba95e10653
-
SHA1
ac08368b132f60bf0bd6adfb78153be62883c878
-
SHA256
0e9ed9a55cd440844668e5937cd2afb5a48dd5a17a3530fc4f9868038e305723
-
SHA512
fa37fec96549faaf75c775902917aa250f484db72c11d3324cabea37deb609d26c992f7dc26ce5714388784cf688a103c8d33d9e82bb9f0acedc357aa86d5844
-
SSDEEP
1536:AO6daHktjZytoFTeuDXvq0Zp2yby0BT7BIP5b6xihOuuvZY:da0o1euDXkyby11hOuGZY
Behavioral task
behavioral1
Sample
oxyinstaller.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
127.0.0.1:32901
engineering-thoroughly.gl.at.ply.gg:32901
-
Install_directory
%AppData%
-
install_file
OxyInstaller.exe
Targets
-
-
Target
oxyinstaller.exe
-
Size
67KB
-
MD5
2b274de1ba95b66b41fd57ba95e10653
-
SHA1
ac08368b132f60bf0bd6adfb78153be62883c878
-
SHA256
0e9ed9a55cd440844668e5937cd2afb5a48dd5a17a3530fc4f9868038e305723
-
SHA512
fa37fec96549faaf75c775902917aa250f484db72c11d3324cabea37deb609d26c992f7dc26ce5714388784cf688a103c8d33d9e82bb9f0acedc357aa86d5844
-
SSDEEP
1536:AO6daHktjZytoFTeuDXvq0Zp2yby0BT7BIP5b6xihOuuvZY:da0o1euDXkyby11hOuGZY
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-