General
-
Target
Extreme Injector v3.exe
-
Size
1.7MB
-
Sample
240711-xkpjaasckg
-
MD5
7420660a865e47dc7b1025cc352ea095
-
SHA1
12745cc499dfe4eb1a1d9fa80cdce00627923222
-
SHA256
ce9cae0fc0b5e4b0c7676bcf50c5b9b77de8b7a9714609e4ff111a8dc747b292
-
SHA512
871726d2e5a0b2ad7b0ea940cdf107ebd8289c3a854764a9e78dc6f257af4f8b9836fdf2c8181c5e9c0f657873619f284aee58b0d57919c4c5db199c152aba0e
-
SSDEEP
49152:ESBWpnwiwBJw0YZ7kLH+IGEWRjI0u5r0JdM/k:DWxW+0YOLH+3Rsb5rIMs
Static task
static1
Malware Config
Extracted
xworm
happy-pregnancy.gl.at.ply.gg:27515
-
Install_directory
%AppData%
-
install_file
Wurst Client.exe
Targets
-
-
Target
Extreme Injector v3.exe
-
Size
1.7MB
-
MD5
7420660a865e47dc7b1025cc352ea095
-
SHA1
12745cc499dfe4eb1a1d9fa80cdce00627923222
-
SHA256
ce9cae0fc0b5e4b0c7676bcf50c5b9b77de8b7a9714609e4ff111a8dc747b292
-
SHA512
871726d2e5a0b2ad7b0ea940cdf107ebd8289c3a854764a9e78dc6f257af4f8b9836fdf2c8181c5e9c0f657873619f284aee58b0d57919c4c5db199c152aba0e
-
SSDEEP
49152:ESBWpnwiwBJw0YZ7kLH+IGEWRjI0u5r0JdM/k:DWxW+0YOLH+3Rsb5rIMs
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-