General
-
Target
202409191600d925862ef753288750008ec0517chiddentear
-
Size
140KB
-
Sample
240919-h11h6awgnd
-
MD5
1600d925862ef753288750008ec0517c
-
SHA1
19d690bb3bd6e9e2a4ae3704ed5eba5c6295996d
-
SHA256
e0f8da5010a1162b1480daec57e3d2122a3f4fc7ab89797fb75536729f7fb7d7
-
SHA512
4828feeb01daadd4f7f39a70814c6da727ca0f71a3e4a25b0ea9ddafc604d8ad2a1300c22490fc68ddd15eb325f99dba0e85a612e0ead4455af2f31116d218e7
-
SSDEEP
3072:/esDcUBEg9YKM+lmsolAIrRuw+mqv9j1MWLQd:/ZBEg9o+lDAA
Behavioral task
behavioral1
Sample
202409191600d925862ef753288750008ec0517chiddentear.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
202409191600d925862ef753288750008ec0517chiddentear.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
week-media.gl.at.ply.gg:28685
k1CSgYnNfhE66GJj
-
install_file
USB.exe
Targets
-
-
Target
202409191600d925862ef753288750008ec0517chiddentear
-
Size
140KB
-
MD5
1600d925862ef753288750008ec0517c
-
SHA1
19d690bb3bd6e9e2a4ae3704ed5eba5c6295996d
-
SHA256
e0f8da5010a1162b1480daec57e3d2122a3f4fc7ab89797fb75536729f7fb7d7
-
SHA512
4828feeb01daadd4f7f39a70814c6da727ca0f71a3e4a25b0ea9ddafc604d8ad2a1300c22490fc68ddd15eb325f99dba0e85a612e0ead4455af2f31116d218e7
-
SSDEEP
3072:/esDcUBEg9YKM+lmsolAIrRuw+mqv9j1MWLQd:/ZBEg9o+lDAA
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1