General
-
Target
v1.3.3.0.exe
-
Size
127.9MB
-
Sample
240825-pbt4eavfjq
-
MD5
4148799f390ce76c949fa93d19c47c9d
-
SHA1
9c3582adc67b0ce791894fc479396ef060fbffba
-
SHA256
008025574eab63a5f3fe116de4c0c709097a356e98efc9f4e2a292888fe6a8ef
-
SHA512
1e7438b77c83fa37b1cbe6e12b7ffcc1b6a7ad197a7f521274e0527fa356672883ee90aa8680eecfd7ca00ba7177d0dbcf53de7ae69b83798dd96e7df6822bc1
-
SSDEEP
3145728:/XWxt9yEdZsfJtVzwS92RjOUbK1MXzzJFW4FTPe9eMx/vPv:/XWxt9SfqS9S7KaDzJFxTPUeMx/v
Static task
static1
Behavioral task
behavioral1
Sample
v1.3.3.0.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
127.0.0.1:19121
goods-flex.gl.at.ply.gg:19121
-
Install_directory
%Public%
-
install_file
calc.exe
Extracted
phemedrone
https://api.telegram.org/bot6766891578:AAE47sIyviQ0_skRFQtvxeYcndg1C8RFyo4/sendDocument
Targets
-
-
Target
v1.3.3.0.exe
-
Size
127.9MB
-
MD5
4148799f390ce76c949fa93d19c47c9d
-
SHA1
9c3582adc67b0ce791894fc479396ef060fbffba
-
SHA256
008025574eab63a5f3fe116de4c0c709097a356e98efc9f4e2a292888fe6a8ef
-
SHA512
1e7438b77c83fa37b1cbe6e12b7ffcc1b6a7ad197a7f521274e0527fa356672883ee90aa8680eecfd7ca00ba7177d0dbcf53de7ae69b83798dd96e7df6822bc1
-
SSDEEP
3145728:/XWxt9yEdZsfJtVzwS92RjOUbK1MXzzJFW4FTPe9eMx/vPv:/XWxt9SfqS9S7KaDzJFxTPUeMx/v
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1