General
-
Target
expensive.exe
-
Size
77KB
-
Sample
240823-wxjm5ayeqg
-
MD5
998b39330740867ac8c6caf7223a8810
-
SHA1
c7b6233aea54a9b552e76dcea65c7ad9bd73aadf
-
SHA256
f46b3855107a51e31315403e355801a1acf6cb80fe3109fa2c1d479187e77e17
-
SHA512
a78da51a9198c641fc215b0e7ae643b564100cce0e5b2abd325a152a4477027af3e78dc362989ffc8075a2544cab9e8f111c63a2a5c1244a8693bd039c3b5ad0
-
SSDEEP
1536:wC49pWSOaKy7GA/QqyGpfD5C6WbfxPgqupiF6n5xGOuePaYK:s/Wf8/zyGpf96bfJg6g5xGOpP3K
Malware Config
Extracted
xworm
127.0.0.1:17570
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
expensive.exe
-
Size
77KB
-
MD5
998b39330740867ac8c6caf7223a8810
-
SHA1
c7b6233aea54a9b552e76dcea65c7ad9bd73aadf
-
SHA256
f46b3855107a51e31315403e355801a1acf6cb80fe3109fa2c1d479187e77e17
-
SHA512
a78da51a9198c641fc215b0e7ae643b564100cce0e5b2abd325a152a4477027af3e78dc362989ffc8075a2544cab9e8f111c63a2a5c1244a8693bd039c3b5ad0
-
SSDEEP
1536:wC49pWSOaKy7GA/QqyGpfD5C6WbfxPgqupiF6n5xGOuePaYK:s/Wf8/zyGpf96bfJg6g5xGOpP3K
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-