Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
ратник.exe
-
Size
62KB
-
Sample
240723-n6h4ysvcja
-
MD5
f5d67f4988d18fb4b52e7de4ad75168d
-
SHA1
b1f3b4d40d3a5e177ec04c478d6a02f85d57e35c
-
SHA256
3c9f38093ef7ca9ff110fdb5cff7fcb4c8eec737536181561e75410a88a9d465
-
SHA512
32223a0e6f50608d992556a4de81f72c3fd62646ea8e340729addfeca02b686dfa450f591c82c2e564d164b62e08a0aaf543dd9c0d3835194d69d279554e79f0
-
SSDEEP
1536:DLxX5T7Oxst3AExTPCObC9+raFgC6lFKJOHhxL:DltcsmEwObCE7EJOHjL
Behavioral task
behavioral1
Sample
ратник.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ратник.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
stores-achieved.gl.at.ply.gg:64510
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
ратник.exe
-
Size
62KB
-
MD5
f5d67f4988d18fb4b52e7de4ad75168d
-
SHA1
b1f3b4d40d3a5e177ec04c478d6a02f85d57e35c
-
SHA256
3c9f38093ef7ca9ff110fdb5cff7fcb4c8eec737536181561e75410a88a9d465
-
SHA512
32223a0e6f50608d992556a4de81f72c3fd62646ea8e340729addfeca02b686dfa450f591c82c2e564d164b62e08a0aaf543dd9c0d3835194d69d279554e79f0
-
SSDEEP
1536:DLxX5T7Oxst3AExTPCObC9+raFgC6lFKJOHhxL:DltcsmEwObCE7EJOHjL
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-