General
-
Target
8b443bbb8ce11c42914085dbe7580c8955a0aa734f6e16b16d59ec75b2dbb4d2
-
Size
41KB
-
Sample
240812-e7x5tswamr
-
MD5
8ae8b784f559521a967cfcb5a547c01a
-
SHA1
c5357a9a78df365346bc79d0c264c9afc7d3dbb1
-
SHA256
8b443bbb8ce11c42914085dbe7580c8955a0aa734f6e16b16d59ec75b2dbb4d2
-
SHA512
8290cc7e00a1a5283f14eca3b23360f752fcf83d87f5c251afba2371f28c72e6beaa59300c178cfbce6881dfb30bad3eb5c6fa3108d4392d5a1706338173d853
-
SSDEEP
768:oreDweeLOoHdSgDder3XvgggzLJF5PG9pmLj6vOwhH43EizD:5DweQldSgDIjXvvgpFI9ALj6vOwqFX
Behavioral task
behavioral1
Sample
8b443bbb8ce11c42914085dbe7580c8955a0aa734f6e16b16d59ec75b2dbb4d2.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b443bbb8ce11c42914085dbe7580c8955a0aa734f6e16b16d59ec75b2dbb4d2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
147.185.221.18:42996
SLopAV8UrbGFfVlc
-
Install_directory
%AppData%
-
install_file
Windows host process.exe
Targets
-
-
Target
8b443bbb8ce11c42914085dbe7580c8955a0aa734f6e16b16d59ec75b2dbb4d2
-
Size
41KB
-
MD5
8ae8b784f559521a967cfcb5a547c01a
-
SHA1
c5357a9a78df365346bc79d0c264c9afc7d3dbb1
-
SHA256
8b443bbb8ce11c42914085dbe7580c8955a0aa734f6e16b16d59ec75b2dbb4d2
-
SHA512
8290cc7e00a1a5283f14eca3b23360f752fcf83d87f5c251afba2371f28c72e6beaa59300c178cfbce6881dfb30bad3eb5c6fa3108d4392d5a1706338173d853
-
SSDEEP
768:oreDweeLOoHdSgDder3XvgggzLJF5PG9pmLj6vOwhH43EizD:5DweQldSgDIjXvvgpFI9ALj6vOwqFX
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1