General
-
Target
rBLNO.KHRTMP249013-SINGAPOREEXPRESSV.002W.scr.exe
-
Size
494KB
-
Sample
240911-yqy6cazejq
-
MD5
c7b1b2fe81251ea803f9417deed5f489
-
SHA1
4de67ca4551be7e994222618c6b798c22cb41d49
-
SHA256
3a4569fea1cb43114cbb901f17440c2b09ae98d58c81acb8fef6526e4946830c
-
SHA512
94522e7f352ff1e4565623cbf25357781f18c0957be288fe1283b5c8ed472a4099104266cb5fdfa53e23f4906273947d5d0c01a9262fffd6517b89068876670b
-
SSDEEP
12288:ZB7kvDoQ+XDR1UEzAWohnusFqB8++sxG/:ZBow1N5OF0G/
Static task
static1
Behavioral task
behavioral1
Sample
rBLNO.KHRTMP249013-SINGAPOREEXPRESSV.002W.scr.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
104.250.180.178:7061
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
rBLNO.KHRTMP249013-SINGAPOREEXPRESSV.002W.scr.exe
-
Size
494KB
-
MD5
c7b1b2fe81251ea803f9417deed5f489
-
SHA1
4de67ca4551be7e994222618c6b798c22cb41d49
-
SHA256
3a4569fea1cb43114cbb901f17440c2b09ae98d58c81acb8fef6526e4946830c
-
SHA512
94522e7f352ff1e4565623cbf25357781f18c0957be288fe1283b5c8ed472a4099104266cb5fdfa53e23f4906273947d5d0c01a9262fffd6517b89068876670b
-
SSDEEP
12288:ZB7kvDoQ+XDR1UEzAWohnusFqB8++sxG/:ZBow1N5OF0G/
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-