General
-
Target
WaveWindows-nc.exe
-
Size
5.5MB
-
Sample
240709-3r38xatamk
-
MD5
e9c64620dc920a64a2448e78de1cff90
-
SHA1
08e62b663da83d2fe304bba18381e87192313201
-
SHA256
26838283be0848527497674165c96a7683ccdbac999d8a226d9878a3ca7717a5
-
SHA512
83ef90821b8da79218c20c0ab287c1155f6d9fe36bee0419187ef215c73a66c33502966cfef4c17ac89502777518f1d00357387716ef914b0c82b0615ea12fc3
-
SSDEEP
49152:N3hTD+mOHaN2e1AUgbOtf7s51lL7Grsm4IPMWnjy5EAP+VZ1LojCWvzThoCW0vai:RJj2etsR7Ggm2Ey1yJvUyb
Static task
static1
Behavioral task
behavioral1
Sample
WaveWindows-nc.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
WaveWindows-nc.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
5.0
C9IM3x5CL1ZIpfuG
-
Install_directory
%LocalAppData%
-
install_file
ReAgentC.exe
-
pastebin_url
https://pastebin.com/raw/UWpQULMP
-
telegram
https://api.telegram.org/bot7420124943:AAF1r0gN9LdH2HJhpp3RjQMBU2cphBasfrs
Targets
-
-
Target
WaveWindows-nc.exe
-
Size
5.5MB
-
MD5
e9c64620dc920a64a2448e78de1cff90
-
SHA1
08e62b663da83d2fe304bba18381e87192313201
-
SHA256
26838283be0848527497674165c96a7683ccdbac999d8a226d9878a3ca7717a5
-
SHA512
83ef90821b8da79218c20c0ab287c1155f6d9fe36bee0419187ef215c73a66c33502966cfef4c17ac89502777518f1d00357387716ef914b0c82b0615ea12fc3
-
SSDEEP
49152:N3hTD+mOHaN2e1AUgbOtf7s51lL7Grsm4IPMWnjy5EAP+VZ1LojCWvzThoCW0vai:RJj2etsR7Ggm2Ey1yJvUyb
Score10/10-
Detect Xworm Payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1