General
-
Target
xworm.zip
-
Size
64.9MB
-
Sample
240829-1kv8lssgqh
-
MD5
4eacddfe84635b2c1817c4533ff63920
-
SHA1
8c0087fc2b84fbf59aa163abcc86b79b769a83d6
-
SHA256
3a77ee6438c4c26856aeb1d4013627b03ab07b98b06d978c7e067caca0e657f3
-
SHA512
af315d17172ff165bcea5937a0b7c37248178252e61ae19102ac3732bc1b5b4481f298a4474c4fee84794b40e9edac9b17002df85cdd17a240ac1db9bdfd92e8
-
SSDEEP
1572864:ZgbHGPnh4vk0M0jruxV7oswXMdNHxzQcvAyOO3RlE6L:xnEkU2mX4zQWAnOBN
Behavioral task
behavioral1
Sample
xworm.zip
Resource
win10-20240404-en
Malware Config
Extracted
xworm
manufacturer-rank.gl.at.ply.gg:60383
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
xworm.zip
-
Size
64.9MB
-
MD5
4eacddfe84635b2c1817c4533ff63920
-
SHA1
8c0087fc2b84fbf59aa163abcc86b79b769a83d6
-
SHA256
3a77ee6438c4c26856aeb1d4013627b03ab07b98b06d978c7e067caca0e657f3
-
SHA512
af315d17172ff165bcea5937a0b7c37248178252e61ae19102ac3732bc1b5b4481f298a4474c4fee84794b40e9edac9b17002df85cdd17a240ac1db9bdfd92e8
-
SSDEEP
1572864:ZgbHGPnh4vk0M0jruxV7oswXMdNHxzQcvAyOO3RlE6L:xnEkU2mX4zQWAnOBN
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload
-
AgentTesla payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1