General
-
Target
PINCRACKERv2.exe
-
Size
12.4MB
-
Sample
240929-3raatswflr
-
MD5
d934ff348a865cc12262a7df63556bc0
-
SHA1
23259e29c1dc49c4c023a5944079bb488da908f3
-
SHA256
66921e2919d00738ad3f048f0334c504a1e0c3a197a0f1eadb204d547a3c3b57
-
SHA512
b1a44d133ee850215aa01d070c8112aa0952fdf18a8b7faca3f73c296cda6fd9f2ed400a96bf2ac07f307cb7d7859b35cb881471c08b09b4f50692062149516f
-
SSDEEP
393216:WtcqWls+P7XbLf8bhf0u08cLaGou0JdKi6xkqe3yO4hjE:WtZWlFP7XbL0py8ceGouKoi6Gq3OP
Static task
static1
Behavioral task
behavioral1
Sample
PINCRACKERv2.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
camera-leadership.gl.at.ply.gg:48241
xfoLhSSL3ZKAFHgp
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7517837255:AAG0nEVWhvscgRKAU7DCjZPeuglJdFmcYws/sendMessage?chat_id=7538845070
Extracted
xworm
5.1
camera-leadership.gl.at.ply.gg:9999
-
Install_directory
%Userprofile%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7517837255:AAG0nEVWhvscgRKAU7DCjZPeuglJdFmcYws/sendMessage?chat_id=7538845070
Targets
-
-
Target
PINCRACKERv2.exe
-
Size
12.4MB
-
MD5
d934ff348a865cc12262a7df63556bc0
-
SHA1
23259e29c1dc49c4c023a5944079bb488da908f3
-
SHA256
66921e2919d00738ad3f048f0334c504a1e0c3a197a0f1eadb204d547a3c3b57
-
SHA512
b1a44d133ee850215aa01d070c8112aa0952fdf18a8b7faca3f73c296cda6fd9f2ed400a96bf2ac07f307cb7d7859b35cb881471c08b09b4f50692062149516f
-
SSDEEP
393216:WtcqWls+P7XbLf8bhf0u08cLaGou0JdKi6xkqe3yO4hjE:WtZWlFP7XbL0py8ceGouKoi6Gq3OP
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-