General
-
Target
EaglesBC.exe
-
Size
8.1MB
-
Sample
240814-rxelysscrk
-
MD5
6db2ccfd83e9719a3a328362e8fe0247
-
SHA1
01e99e55c4a89274a0f6bbaaf9a32bab7db5f652
-
SHA256
66fcc6ec0e395dda3758e85486fc5a405d3c67e5f659ba1b5cdf9954450973d2
-
SHA512
c9df7dddadc8a4d89b00a2f47d8bd2e01c5d52e2b65112cc2fc7b4f12e0998ad2fb3b5641bfca28dc6cd859cc3db21c8ee97c7f11cadfd387d752b2bdf4ba001
-
SSDEEP
196608:JmWjRSUnMjo1wlLYpWnpSQNMev7GwwgUXhE:3jRrnTw9JnQ706X
Static task
static1
Behavioral task
behavioral1
Sample
EaglesBC.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
church-insight.gl.at.ply.gg:54667
-
Install_directory
%ProgramData%
-
install_file
ntoskrnl.exe
Targets
-
-
Target
EaglesBC.exe
-
Size
8.1MB
-
MD5
6db2ccfd83e9719a3a328362e8fe0247
-
SHA1
01e99e55c4a89274a0f6bbaaf9a32bab7db5f652
-
SHA256
66fcc6ec0e395dda3758e85486fc5a405d3c67e5f659ba1b5cdf9954450973d2
-
SHA512
c9df7dddadc8a4d89b00a2f47d8bd2e01c5d52e2b65112cc2fc7b4f12e0998ad2fb3b5641bfca28dc6cd859cc3db21c8ee97c7f11cadfd387d752b2bdf4ba001
-
SSDEEP
196608:JmWjRSUnMjo1wlLYpWnpSQNMev7GwwgUXhE:3jRrnTw9JnQ706X
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1