General
-
Target
Пароль - fun.rar
-
Size
44KB
-
Sample
240908-gqk52ssekf
-
MD5
b12f0b9937f1b0227841c7da177a7143
-
SHA1
5771e6991f8e4ad6ed6d8d75ca90a0e8207c932a
-
SHA256
6dde36f51016d0a86cce39af279d69718d7641669e4316623389b48e6ca9bba2
-
SHA512
3c414506af3b92cd1205cab22a24f821825e770c06ed7d4a5bdfdad32f9b792429e00c6435b6885b15a9de9bc6df884a8696fdc9b5e2eaa1cc39b13c2b622b49
-
SSDEEP
768:XLAzZqCB64Oltk8K+esBhvjtDZBq2scDTpNO/Kb7ZoJS4fPdu9DdMxSirhPDt6SE:7AFqCqHmcn7BJ7p28toYC1a2smb3zdq
Malware Config
Extracted
xworm
22.ip.gl.ply.gg:26725
-
Install_directory
%AppData%
-
install_file
FunTimeDupe.exe
Targets
-
-
Target
FunTimeDupe.exe
-
Size
73KB
-
MD5
4c781d300e8936e7d346aa6bb9e0d047
-
SHA1
3fb080480e2aff550e7ee294de0d34a3848a98c1
-
SHA256
03bb35cebf02bc267408a7e78307cf765608bf5d987e45991e2999e299de7c7a
-
SHA512
d65deb9781ca7f3c07ada93a21d57b8aa1f63d680b9ca68151e286e45b7f1c41aa34428d08040a71bb952aa5eced1128f04eab007ec35d9bab7e804533ce68aa
-
SSDEEP
1536:qayRZGJmhZiTySjhZDnk/9+bOvACJMea4ki/OV6JWXO3jOujo7c:qayxhZiuSjhhg+bOvrJdObO6ujec
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-