General
-
Target
Services.exe
-
Size
163KB
-
Sample
240727-yhgakaybra
-
MD5
c9ecd9d8da218f635e1e3eb17b36c5ee
-
SHA1
6b14cf165fed4c9162a4eafa318b4fb0c36179ae
-
SHA256
4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac
-
SHA512
3d08906cb93b6fde2ba00b857caba32d5dd6d787fbc9356a310b8bc8688620a0c7f2a39114dbd705f736d5721f6ca613d859ccc3b752f780398146801777be5e
-
SSDEEP
3072:Ie36qVTppS1GzxfExMNtuHBZYyHm836yDlWH7wUoh4V5RuEm9:I+NVTpUkzpEYtuA8qClWUGD
Static task
static1
Behavioral task
behavioral1
Sample
Services.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Services.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
discordrat
-
discord_token
MTI0MzQwMTQ3NzkxNDA5OTc0Mg.GWaL1X.yE8UNSG-cUTQGBUsIKtYnV7nQvqnPmErG-61w8
-
server_id
1265998097473994865
Extracted
xworm
serveo.net:8545
-
Install_directory
%AppData%
-
install_file
svbhost.exe
Targets
-
-
Target
Services.exe
-
Size
163KB
-
MD5
c9ecd9d8da218f635e1e3eb17b36c5ee
-
SHA1
6b14cf165fed4c9162a4eafa318b4fb0c36179ae
-
SHA256
4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac
-
SHA512
3d08906cb93b6fde2ba00b857caba32d5dd6d787fbc9356a310b8bc8688620a0c7f2a39114dbd705f736d5721f6ca613d859ccc3b752f780398146801777be5e
-
SSDEEP
3072:Ie36qVTppS1GzxfExMNtuHBZYyHm836yDlWH7wUoh4V5RuEm9:I+NVTpUkzpEYtuA8qClWUGD
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1