General
-
Target
DDOS MACHINE.exe
-
Size
246KB
-
Sample
240818-zs6hwaxcjp
-
MD5
3f4ac5ebf07ce3b4fbf7c53a99e9a95a
-
SHA1
3fe8113fa02867e96b671916a1f64afd0652bb3f
-
SHA256
4e2f315aec3cb1e8bc76424378ece6fa983d440b24d28863db91985f1adf4e7f
-
SHA512
c1099c4874e90cc0aa571434b6d8681e08914eb9fc21d6b2ff55aa4a3c459e769dff29a4121f728f047a6b714d9adc7f8c9493aaccfeffe57e11321bb36bc7de
-
SSDEEP
6144:gr9hCkZbhCFr+UhcX7elbKTua9bfF/H9d9n:gr9hCUE+3X3u+
Behavioral task
behavioral1
Sample
DDOS MACHINE.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DDOS MACHINE.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
193.161.193.99:1194
-
Install_directory
%ProgramData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7359511930:AAFUm0iYhzGrRDo1gtea6bO9ZS8MYaGi__U/sendMessage?chat_id=6243944849
Targets
-
-
Target
DDOS MACHINE.exe
-
Size
246KB
-
MD5
3f4ac5ebf07ce3b4fbf7c53a99e9a95a
-
SHA1
3fe8113fa02867e96b671916a1f64afd0652bb3f
-
SHA256
4e2f315aec3cb1e8bc76424378ece6fa983d440b24d28863db91985f1adf4e7f
-
SHA512
c1099c4874e90cc0aa571434b6d8681e08914eb9fc21d6b2ff55aa4a3c459e769dff29a4121f728f047a6b714d9adc7f8c9493aaccfeffe57e11321bb36bc7de
-
SSDEEP
6144:gr9hCkZbhCFr+UhcX7elbKTua9bfF/H9d9n:gr9hCUE+3X3u+
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1