General
-
Target
Xworm Client Fixer.exe
-
Size
7.7MB
-
Sample
240904-2q2g9axhjr
-
MD5
578187de072dd878bb35a7470b0041c6
-
SHA1
06c3c1eef478ba1c6961e75631722f1bec71f219
-
SHA256
6603341c43b8f511194d08b846f858acf82552d7a3487e2f183c8a8f0e0d53cd
-
SHA512
986b9e11d529db106880dfdb51b2e386a9f00fe5946965cdca8c9e7f129cef1df1dd9bd218269a770cac8b6cfa43a9b4476024f0578151b1ae3de6cd20913e61
-
SSDEEP
98304:MRB82S1mjR8wNPvzqv1dJ3aN5p1z+HH/1A7LkQgYGJo6DXbvCIco+3Gz9/Sd3+jk:+8luhW1dJqN14NapK9rCY+C96A3Xpa
Static task
static1
Behavioral task
behavioral1
Sample
Xworm Client Fixer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Xworm Client Fixer.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
manufacturer-rank.gl.at.ply.gg:60383
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Xworm Client Fixer.exe
-
Size
7.7MB
-
MD5
578187de072dd878bb35a7470b0041c6
-
SHA1
06c3c1eef478ba1c6961e75631722f1bec71f219
-
SHA256
6603341c43b8f511194d08b846f858acf82552d7a3487e2f183c8a8f0e0d53cd
-
SHA512
986b9e11d529db106880dfdb51b2e386a9f00fe5946965cdca8c9e7f129cef1df1dd9bd218269a770cac8b6cfa43a9b4476024f0578151b1ae3de6cd20913e61
-
SSDEEP
98304:MRB82S1mjR8wNPvzqv1dJ3aN5p1z+HH/1A7LkQgYGJo6DXbvCIco+3Gz9/Sd3+jk:+8luhW1dJqN14NapK9rCY+C96A3Xpa
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1