General
-
Target
Solara v4.exe
-
Size
327KB
-
Sample
240905-pkfx5s1alj
-
MD5
e8bcc353f4f717e0a9ec8df42c34beb4
-
SHA1
56b5eedbe3ecc2c44a887bbd1f2d9dbb4a9ed97c
-
SHA256
a272b0c9c1ef29b030408018c792c43d5f8f0b2b43142af5cb52bcfba899e4c7
-
SHA512
0c6efe15d37163e96551915bef458b91c29ef79712e3d4c4b18272acaa33538af74f6515cd63be622005aded238c761010778e0af8dea4adfdec3ef7c587fd84
-
SSDEEP
6144:n98Spzgs21x/GJqkntASwQvJzp8kRJoKXqwUHrsTB2zs+FAWKiXG/D8Sf7KVyBs:+Kgs2X/gDiVBQTB2zI6S8SW8Bs
Static task
static1
Behavioral task
behavioral1
Sample
Solara v4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solara v4.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
3.0
silver-bowl.gl.at.ply.gg:29206
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Solara v4.exe
-
Size
327KB
-
MD5
e8bcc353f4f717e0a9ec8df42c34beb4
-
SHA1
56b5eedbe3ecc2c44a887bbd1f2d9dbb4a9ed97c
-
SHA256
a272b0c9c1ef29b030408018c792c43d5f8f0b2b43142af5cb52bcfba899e4c7
-
SHA512
0c6efe15d37163e96551915bef458b91c29ef79712e3d4c4b18272acaa33538af74f6515cd63be622005aded238c761010778e0af8dea4adfdec3ef7c587fd84
-
SSDEEP
6144:n98Spzgs21x/GJqkntASwQvJzp8kRJoKXqwUHrsTB2zs+FAWKiXG/D8Sf7KVyBs:+Kgs2X/gDiVBQTB2zI6S8SW8Bs
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-