General
-
Target
9858b58784c5c31cb009b460f358dbe0N.exe
-
Size
59KB
-
Sample
240824-ymx4wayark
-
MD5
9858b58784c5c31cb009b460f358dbe0
-
SHA1
4071b7d709faf8e420a8f42977c99fcf40fd5eb2
-
SHA256
1d9d5421af5c484e34ba49a9a7ec61e1dfdef6c41b0017ff761342589dacccfb
-
SHA512
ceeb63003184857240e1a670cbea6f8c469dfc134f066f771944518a3de32550877032661d14bf8a11c61b6445d35c9658be619d1aa35841c1ee6c723b439167
-
SSDEEP
1536:5gkAOwHZCiQnb5k0wLCzlcaH9nSHi9dS1EAd8IIu:5QYnb5Cuz9SHi3gEA6IIu
Behavioral task
behavioral1
Sample
9858b58784c5c31cb009b460f358dbe0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9858b58784c5c31cb009b460f358dbe0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
127.0.0.1:43771
y-drives.gl.at.ply.gg:43771:43771
-
Install_directory
%AppData%
-
install_file
dllhuy.exe
Targets
-
-
Target
9858b58784c5c31cb009b460f358dbe0N.exe
-
Size
59KB
-
MD5
9858b58784c5c31cb009b460f358dbe0
-
SHA1
4071b7d709faf8e420a8f42977c99fcf40fd5eb2
-
SHA256
1d9d5421af5c484e34ba49a9a7ec61e1dfdef6c41b0017ff761342589dacccfb
-
SHA512
ceeb63003184857240e1a670cbea6f8c469dfc134f066f771944518a3de32550877032661d14bf8a11c61b6445d35c9658be619d1aa35841c1ee6c723b439167
-
SSDEEP
1536:5gkAOwHZCiQnb5k0wLCzlcaH9nSHi9dS1EAd8IIu:5QYnb5Cuz9SHi3gEA6IIu
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-