General
-
Target
RunTimeBroker.exe
-
Size
39KB
-
Sample
240628-3sddwavhjc
-
MD5
0061dd18de7cfdd840fbce10433e8d73
-
SHA1
9852fe23c191a11a387a7f7a7744c15b1d7d601a
-
SHA256
06ebe0fa2a8df8fe5a51879b6e4a81292bd36668e619666f94db94641666abd9
-
SHA512
4687b8357ef603dfbefd0661d103a454d7d1dc3448526d6e9d21823a2d60b485cea307eedf846dd695bc2009534abd1081461d03f39729dc9c642478a6d87411
-
SSDEEP
768:N2CSKPu9Wkh6A9C96eutXwwTSmvAFU9OLj6SOMhNL575A:EVK6WgMs2moFU9Yj6SOM/pi
Behavioral task
behavioral1
Sample
RunTimeBroker.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
RunTimeBroker.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
5.0
rTw9cIeh9w3su4g8
-
Install_directory
%AppData%
-
install_file
Dllhost.exe
-
pastebin_url
https://pastebin.com/raw/pw1j2xqz
Targets
-
-
Target
RunTimeBroker.exe
-
Size
39KB
-
MD5
0061dd18de7cfdd840fbce10433e8d73
-
SHA1
9852fe23c191a11a387a7f7a7744c15b1d7d601a
-
SHA256
06ebe0fa2a8df8fe5a51879b6e4a81292bd36668e619666f94db94641666abd9
-
SHA512
4687b8357ef603dfbefd0661d103a454d7d1dc3448526d6e9d21823a2d60b485cea307eedf846dd695bc2009534abd1081461d03f39729dc9c642478a6d87411
-
SSDEEP
768:N2CSKPu9Wkh6A9C96eutXwwTSmvAFU9OLj6SOMhNL575A:EVK6WgMs2moFU9Yj6SOM/pi
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-