General
-
Target
XWorm-V3.1-main.zip
-
Size
35.0MB
-
Sample
240907-nk1f4ssajp
-
MD5
d7907542c90fc162306ded4f7503a2c4
-
SHA1
3436c39c3de23fea5cb7ef4403c56a140bdd4cdb
-
SHA256
ab8c5188ad40614d30e6306e31a79224ff62c8b110ebce9f8d438e7476948977
-
SHA512
a913aaf09bd7fa56097cdd57b1be760ee0b92908453556399c52cba4c68bbb26248a074828780d162b1082edad53284bb474f2abcabf32c9d317a3ffc028ce55
-
SSDEEP
786432:fjiDNnx2+WNY0bAgRuIr38/aUZc+VnGajZAS//p643fU74mB48zN4Elrly5tV3Lz:7iDNnxVWi0bAgAo8/aang000fY458yE8
Behavioral task
behavioral1
Sample
XWorm-V3.1-main/XWorm V3.1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
XWorm-V3.1-main/XWorm V3.1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
3.0
18.ip.gl.ply.gg:35094
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
XWorm-V3.1-main/XWorm V3.1.exe
-
Size
13.5MB
-
MD5
32dcf4cd512da44a9d2a66f167da02e7
-
SHA1
4224b58657428bb6edb85c73be85a9bcffb46c09
-
SHA256
0d51c076489c1f892c81460633b8780dbf257ae2f3798d727a138d741ac132f2
-
SHA512
6e0b843930ac48adad31f95e45fc2252bb0194b202be5d995b98b6ef926427e33e8b7be5ecf7615440ec314a4971a007ccf1c08b083ebae1217dbbc135320069
-
SSDEEP
393216:myjEZpRN3b67r3f4/fxU8IWUIURsLBHiEZhQfbx7P5kvxT:zEZp+3Q/JU8b5YIBHNCfF7P5kv1
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3