General
-
Target
20241001245bac5c1fa9cc473b6e76b4836bfe4favoslockerhijackloader
-
Size
5.7MB
-
Sample
241001-zzznxa1aml
-
MD5
245bac5c1fa9cc473b6e76b4836bfe4f
-
SHA1
7794f9d32ba675be661fb78c70e1ab7149eeab18
-
SHA256
2ef3d4da1131b0d083b57ebaf81673f5711a1b8c3657cc8b0e9f4066d2b273da
-
SHA512
97742eae20586bf8170067f56e3ba5d79f34f2a158f6c9f917efcd8f114aff625901e77ab907c9d57e97584fdfa87cd69132cddb63078628a8b2a0cbc4c6aaa7
-
SSDEEP
98304:/NAq7yUIhuaAkrMmCqNAq7yUIhuaAkrMmCBNAq7yUIhuaAkrMmClOU/jIEeQfoRS:/+KFaRj+KFaRg+KFaRyFIF0wu
Static task
static1
Behavioral task
behavioral1
Sample
20241001245bac5c1fa9cc473b6e76b4836bfe4favoslockerhijackloader.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
3.1
23.26.201.172:8899
REaMgxQu68UQguvi
-
install_file
USB.exe
Targets
-
-
Target
20241001245bac5c1fa9cc473b6e76b4836bfe4favoslockerhijackloader
-
Size
5.7MB
-
MD5
245bac5c1fa9cc473b6e76b4836bfe4f
-
SHA1
7794f9d32ba675be661fb78c70e1ab7149eeab18
-
SHA256
2ef3d4da1131b0d083b57ebaf81673f5711a1b8c3657cc8b0e9f4066d2b273da
-
SHA512
97742eae20586bf8170067f56e3ba5d79f34f2a158f6c9f917efcd8f114aff625901e77ab907c9d57e97584fdfa87cd69132cddb63078628a8b2a0cbc4c6aaa7
-
SSDEEP
98304:/NAq7yUIhuaAkrMmCqNAq7yUIhuaAkrMmCBNAq7yUIhuaAkrMmClOU/jIEeQfoRS:/+KFaRj+KFaRg+KFaRyFIF0wu
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1