General
-
Target
svchost (1).exe
-
Size
82KB
-
Sample
240914-x7myza1gnm
-
MD5
ada1fa7e34fa69a5cd24dc1d1b3debae
-
SHA1
7296af10c7d488e99a4ac9baa7320a8a6fee4ad9
-
SHA256
11b78f00904b9490b7249e720c6438289d667e19785dfd0495f85603f1fbfaac
-
SHA512
323b57f769ca8796e14b64a0692b97ff202f31eccf013c42606e4a678cdf32ebedfaef875e8141faba2f1ce65e34317f82f2085f8954dab865a2f6e6503f5923
-
SSDEEP
1536:LY8aA1uBsDOS2Cxu1fsLtMnveTFVwKbkezlfCRYSX68i+xDO5j+n2h2PiU:MQ1uRS2CxsIVMKbkezVWhhieO5j+2GR
Malware Config
Extracted
xworm
147.185.221.22:7689
127.0.0.1:7689
-
Install_directory
%Temp%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7460424057:AAFqb7sl9YoUjtnfCXABy_ETYSrIdrvDNo8/sendMessage?chat_id=7309152263
Targets
-
-
Target
svchost (1).exe
-
Size
82KB
-
MD5
ada1fa7e34fa69a5cd24dc1d1b3debae
-
SHA1
7296af10c7d488e99a4ac9baa7320a8a6fee4ad9
-
SHA256
11b78f00904b9490b7249e720c6438289d667e19785dfd0495f85603f1fbfaac
-
SHA512
323b57f769ca8796e14b64a0692b97ff202f31eccf013c42606e4a678cdf32ebedfaef875e8141faba2f1ce65e34317f82f2085f8954dab865a2f6e6503f5923
-
SSDEEP
1536:LY8aA1uBsDOS2Cxu1fsLtMnveTFVwKbkezlfCRYSX68i+xDO5j+n2h2PiU:MQ1uRS2CxsIVMKbkezVWhhieO5j+2GR
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-