General
-
Target
file.ps1
-
Size
47B
-
Sample
240707-rvhwlawfpg
-
MD5
ba644fc1ec08acd03635e632eca767ce
-
SHA1
c43ff24b42307a56efe51fdcc90ba3f3688a83f5
-
SHA256
8fa3b77007a27683e1e3c2e59d9c46aff40df0a9f486b5dc48686ec5e4dc29a9
-
SHA512
5a0a21c01f379c82ace0cae841e83f250c0989055c4f97c1fe61374875ec618607f9184a86d77a6f1414adb55a4e560cf462e6087e49c9a72ab7ec05243f6386
Static task
static1
Behavioral task
behavioral1
Sample
file.ps1
Resource
win7-20240704-en
Malware Config
Extracted
https://rentry.co/CODEDZ/raw
Extracted
xworm
authority-amazon.gl.at.ply.gg:41414
-
Install_directory
%Temp%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7385944449:AAEaUrwMYX_XiDFQnXFCUvo82onFpxTx034/sendMessage?chat_id=7032597484
Extracted
gurcu
https://api.telegram.org/bot7385944449:AAEaUrwMYX_XiDFQnXFCUvo82onFpxTx034/sendMessage?chat_id=7032597484
Targets
-
-
Target
file.ps1
-
Size
47B
-
MD5
ba644fc1ec08acd03635e632eca767ce
-
SHA1
c43ff24b42307a56efe51fdcc90ba3f3688a83f5
-
SHA256
8fa3b77007a27683e1e3c2e59d9c46aff40df0a9f486b5dc48686ec5e4dc29a9
-
SHA512
5a0a21c01f379c82ace0cae841e83f250c0989055c4f97c1fe61374875ec618607f9184a86d77a6f1414adb55a4e560cf462e6087e49c9a72ab7ec05243f6386
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2