General
-
Target
jiggycool.exe
-
Size
5.3MB
-
Sample
240913-zt5mzazaja
-
MD5
6c456c5fd2f355394f5cef55902805d2
-
SHA1
aaa68d5888ad38a3e37c689e425424188fad4f1e
-
SHA256
f9e6ac8416e5d9008770b79f7621c1b6769b5bb4fa3b7233e2654dc86927683d
-
SHA512
1e8db23de44bcb78620724eb7435b6ff0efa73cb0155feb72200e98042cd62e458a9c5946004086c3529a0e0dbb930275d689e6d981e68168214cf4859385f71
-
SSDEEP
98304:++2p3/9yx7AQO0pW44GKkJu38pbnSLuXEJisbgVr0pC1sloAl/RedB:Y/9yx7AQOEW3l6uspnTWcr0QOiCZ
Static task
static1
Behavioral task
behavioral1
Sample
jiggycool.exe
Resource
win11-20240802-en
Malware Config
Extracted
xworm
5.0
alternative-pill.gl.at.ply.gg:40543
xTt0pJ05czkYxT70
-
install_file
USB.exe
Targets
-
-
Target
jiggycool.exe
-
Size
5.3MB
-
MD5
6c456c5fd2f355394f5cef55902805d2
-
SHA1
aaa68d5888ad38a3e37c689e425424188fad4f1e
-
SHA256
f9e6ac8416e5d9008770b79f7621c1b6769b5bb4fa3b7233e2654dc86927683d
-
SHA512
1e8db23de44bcb78620724eb7435b6ff0efa73cb0155feb72200e98042cd62e458a9c5946004086c3529a0e0dbb930275d689e6d981e68168214cf4859385f71
-
SSDEEP
98304:++2p3/9yx7AQO0pW44GKkJu38pbnSLuXEJisbgVr0pC1sloAl/RedB:Y/9yx7AQOEW3l6uspnTWcr0QOiCZ
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-