General
-
Target
Xworm-V5.6.zip
-
Size
25.2MB
-
Sample
240918-dnnllszcka
-
MD5
d18f377c546832a6b0183c547a3ad517
-
SHA1
3578b3928f5301d00548796c99161f9ae2e60fb4
-
SHA256
2368e1d752189cf9fb261654297374562e6264d085f01664dd767eced3d51977
-
SHA512
ad1d9eb6530c32b2f1f342583a549a32970fc24b94b088da81dcf83b5d987123bb7f2ab79c5afe638d4cbd3b4495240bc7100acda72b477523638c025d24429b
-
SSDEEP
393216:Z9FQtR33r3EbAeIo6rUwvzICt9w8MDdGOQx3+9yX8nDggInFa9q/2RiDN7vFKjEn:Zv+gbHG974jqjXEDggygE/2RM9KYbwG
Behavioral task
behavioral1
Sample
Xworm-V5.6.zip
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
manufacturer-rank.gl.at.ply.gg:60383
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Xworm-V5.6.zip
-
Size
25.2MB
-
MD5
d18f377c546832a6b0183c547a3ad517
-
SHA1
3578b3928f5301d00548796c99161f9ae2e60fb4
-
SHA256
2368e1d752189cf9fb261654297374562e6264d085f01664dd767eced3d51977
-
SHA512
ad1d9eb6530c32b2f1f342583a549a32970fc24b94b088da81dcf83b5d987123bb7f2ab79c5afe638d4cbd3b4495240bc7100acda72b477523638c025d24429b
-
SSDEEP
393216:Z9FQtR33r3EbAeIo6rUwvzICt9w8MDdGOQx3+9yX8nDggInFa9q/2RiDN7vFKjEn:Zv+gbHG974jqjXEDggygE/2RM9KYbwG
Score10/10-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1