General
-
Target
1c742cf055297ced1f29fa5779cfa2c9c53fc64d945d6edd7330beb5f0d88a72
-
Size
296KB
-
Sample
240828-vcvzzswfqe
-
MD5
7c43de969f5117062f9e2aff9c32b5c8
-
SHA1
5887cd36102f856abf27e885c3c10e78ca8032a4
-
SHA256
1c742cf055297ced1f29fa5779cfa2c9c53fc64d945d6edd7330beb5f0d88a72
-
SHA512
30004800e2b002e4b1f1c6bbdc4fc8a00d5f56ddb859b1047fcce63dd14ca51cc3ef9d7599b440b9795e3587b6af333728d75bd37ae5004ef3189f530ef6eebd
-
SSDEEP
6144:clGtyUXasfHznB3XjdOwkL1xOh9XLpf6TUIa1bq/KMw:cJUXBB3zEjLPUf6J
Static task
static1
Behavioral task
behavioral1
Sample
1c742cf055297ced1f29fa5779cfa2c9c53fc64d945d6edd7330beb5f0d88a72.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1c742cf055297ced1f29fa5779cfa2c9c53fc64d945d6edd7330beb5f0d88a72.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
127.0.0.1:19121
goods-flex.gl.at.ply.gg:19121
-
Install_directory
%Public%
-
install_file
calc.exe
Extracted
phemedrone
https://api.telegram.org/bot6766891578:AAE47sIyviQ0_skRFQtvxeYcndg1C8RFyo4/sendDocument
Targets
-
-
Target
1c742cf055297ced1f29fa5779cfa2c9c53fc64d945d6edd7330beb5f0d88a72
-
Size
296KB
-
MD5
7c43de969f5117062f9e2aff9c32b5c8
-
SHA1
5887cd36102f856abf27e885c3c10e78ca8032a4
-
SHA256
1c742cf055297ced1f29fa5779cfa2c9c53fc64d945d6edd7330beb5f0d88a72
-
SHA512
30004800e2b002e4b1f1c6bbdc4fc8a00d5f56ddb859b1047fcce63dd14ca51cc3ef9d7599b440b9795e3587b6af333728d75bd37ae5004ef3189f530ef6eebd
-
SSDEEP
6144:clGtyUXasfHznB3XjdOwkL1xOh9XLpf6TUIa1bq/KMw:cJUXBB3zEjLPUf6J
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1