General
-
Target
Output.exe
-
Size
88KB
-
Sample
240824-t6kwfazajf
-
MD5
1d5de6633597e967fa624860a9c11381
-
SHA1
d5b718eb8dc6dd145c9a55a0a697a94cf071492d
-
SHA256
55f04f3aab2ae05b415095b2037ed4fce36c931bdbbd49292f3f3f4e886e5143
-
SHA512
698c2a4428f3768de63e8dc6681d9947386d17827055b1ec446b609a109bc78a6a5239f66aad60b779e67009242e9b117c7c3fe7a7fa9cac9bfb717e1ca7ab29
-
SSDEEP
1536:YSH26AQ95RO4BJULzUrx5yNcG/Ny32UkdBCa7NKuV9N3Y9zaZd:lv5ROihN5yrNyG/dQa7NKul3Y9mZd
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
rules-views.at.ply.gg:21974
Uf6Nl0qMPg6NLqce
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Extracted
phemedrone
https://api.telegram.org/bot7375773294:AAFZUnpXCxGuVizu2hOj5WMYl9ULnbeqZ6c/sendDocument
Targets
-
-
Target
Output.exe
-
Size
88KB
-
MD5
1d5de6633597e967fa624860a9c11381
-
SHA1
d5b718eb8dc6dd145c9a55a0a697a94cf071492d
-
SHA256
55f04f3aab2ae05b415095b2037ed4fce36c931bdbbd49292f3f3f4e886e5143
-
SHA512
698c2a4428f3768de63e8dc6681d9947386d17827055b1ec446b609a109bc78a6a5239f66aad60b779e67009242e9b117c7c3fe7a7fa9cac9bfb717e1ca7ab29
-
SSDEEP
1536:YSH26AQ95RO4BJULzUrx5yNcG/Ny32UkdBCa7NKuV9N3Y9zaZd:lv5ROihN5yrNyG/dQa7NKul3Y9mZd
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-