General
-
Target
Cloner.rar
-
Size
7.8MB
-
Sample
240822-nrcnmaxfjp
-
MD5
868f1d27dc7df68a7bbade743b53591d
-
SHA1
90329a5eac86f747257136c2598ec957aa52e849
-
SHA256
6b2fa04530c63518a58edb2b16e56e5b14d2f7a25ea0b852dd0622fc43ab3d1a
-
SHA512
5a57d4ec38725f3682169a0d2aed474fa468bd3f60d65482147ad9984d337fa8efe74d22cbd15840b1a1f46f7e7ec0fb246ab2ccf92cba8e23f4879d51c4c78d
-
SSDEEP
196608:/KWmlZ0RoP81IKwiUzdkJOdw3vdTD36qdsXnKZ5ywXzo:/sl6VSKwV3dw3v5Kv3KZFE
Static task
static1
Behavioral task
behavioral1
Sample
DiscordCloner1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DiscordCloner1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
22.ip.gl.ply.gg:14237
-
Install_directory
%ProgramData%
-
install_file
Svchost.exe
Targets
-
-
Target
DiscordCloner1.exe
-
Size
7.8MB
-
MD5
2281c60616dafe2fa054b884a19326c2
-
SHA1
131ac246d9a375dbf71af777c475e39fb428cd53
-
SHA256
757086454e8acecdc9558e745160d6f662be0f43425e97da94097bbe990800c8
-
SHA512
6f9e6995f140cb2b60e828bb46447f40abc79e20bd40581bca4192da4971dc06571a5986ccccfa4e06a3871571ad0a6cc22907fcdaad3f5dacf0b491cc17dc25
-
SSDEEP
196608:JKWmlZ0RoP81IKwiUzdkJOdw3vdTD36qdsXnKZ5ywXz:Jsl6VSKwV3dw3v5Kv3KZF
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1