General
-
Target
7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43N
-
Size
271KB
-
Sample
240921-gwrj1syckn
-
MD5
776f1ab7d2bb8807a424d6947f299e30
-
SHA1
508297113c75884fdf374b8aa9eb74f92e5a0cbe
-
SHA256
7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43
-
SHA512
2237fdd9bf1644c9b684c26c3042e423de8bfcfe4b3c171b4a8e5cba35de5934393d60e33432f45aa1385e4050227a7ba4912c6e6e3151a0d8c9527495c44679
-
SSDEEP
6144:uutkz7bbo7e7i99999Yki76sNV6/68/27ySQPLL:OL4e7i99999Yki76skPLL
Behavioral task
behavioral1
Sample
7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
91.166.206.112:39575
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43N
-
Size
271KB
-
MD5
776f1ab7d2bb8807a424d6947f299e30
-
SHA1
508297113c75884fdf374b8aa9eb74f92e5a0cbe
-
SHA256
7973fcb627c7c8558c7aaf62ec80f24e29a106d9ea7fe2e2fbcf71a5f1a19e43
-
SHA512
2237fdd9bf1644c9b684c26c3042e423de8bfcfe4b3c171b4a8e5cba35de5934393d60e33432f45aa1385e4050227a7ba4912c6e6e3151a0d8c9527495c44679
-
SSDEEP
6144:uutkz7bbo7e7i99999Yki76sNV6/68/27ySQPLL:OL4e7i99999Yki76skPLL
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1