General
-
Target
f147c417bbf4f8fd3bd5745710bbc3bebde61af81323443fe918673830389bc3.exe
-
Size
62KB
-
Sample
241002-b4wwtavclf
-
MD5
b21ab710ce4e60b33dcd3bdb128c8818
-
SHA1
3b7ba2407fa8b0f6efe28b1f94862a19395433bf
-
SHA256
f147c417bbf4f8fd3bd5745710bbc3bebde61af81323443fe918673830389bc3
-
SHA512
694c5216fb5f590cd5544fcbba6c3374b97254ce68c51316ac2eebd32192228222be52018fb6b51c20d1c20dbf20e5bf65a92955436940e61de68ee1a45f5547
-
SSDEEP
768:iaG6Z0e6xt0HFeDTmAE1paSfU4Z+Klg51FlJK1VY3iIrJlKxVo4ttWLAZn:iaG6Ct0iER9+KiDJAY3iIF8ro47WLy
Static task
static1
Behavioral task
behavioral1
Sample
f147c417bbf4f8fd3bd5745710bbc3bebde61af81323443fe918673830389bc3.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f147c417bbf4f8fd3bd5745710bbc3bebde61af81323443fe918673830389bc3.exe
-
Size
62KB
-
MD5
b21ab710ce4e60b33dcd3bdb128c8818
-
SHA1
3b7ba2407fa8b0f6efe28b1f94862a19395433bf
-
SHA256
f147c417bbf4f8fd3bd5745710bbc3bebde61af81323443fe918673830389bc3
-
SHA512
694c5216fb5f590cd5544fcbba6c3374b97254ce68c51316ac2eebd32192228222be52018fb6b51c20d1c20dbf20e5bf65a92955436940e61de68ee1a45f5547
-
SSDEEP
768:iaG6Z0e6xt0HFeDTmAE1paSfU4Z+Klg51FlJK1VY3iIrJlKxVo4ttWLAZn:iaG6Ct0iER9+KiDJAY3iIF8ro47WLy
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1