General
-
Target
WaveCrackedDMP.exe
-
Size
73KB
-
Sample
241003-q9n6gsscld
-
MD5
ce4f1a100fd681cfe3d3c9d1b2796f7f
-
SHA1
fff7ebb099769718af77eb88d20e0a2a643f81fa
-
SHA256
1aa182ba676ff52db9e4ee9aec4240daf43d3d2db8ed7b2f5c321d14a32167f6
-
SHA512
fcb297232aa4929e59d1625a0cbd9d840a3858c412e2eb590917f381acd81534d864841bbe5a941504706203411719cd1e52a4290d7cf76a0ffbc68040595803
-
SSDEEP
1536:tC9LgfUnFsz21dO4tY6KHvc+bPU2USzhO3vvw2j:tC9LsUnJ14bE+bcFS1OH/j
Behavioral task
behavioral1
Sample
WaveCrackedDMP.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WaveCrackedDMP.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
thread-advanced.gl.at.ply.gg:4794
-
Install_directory
%AppData%
-
install_file
WaveCrackDMP.exe
Targets
-
-
Target
WaveCrackedDMP.exe
-
Size
73KB
-
MD5
ce4f1a100fd681cfe3d3c9d1b2796f7f
-
SHA1
fff7ebb099769718af77eb88d20e0a2a643f81fa
-
SHA256
1aa182ba676ff52db9e4ee9aec4240daf43d3d2db8ed7b2f5c321d14a32167f6
-
SHA512
fcb297232aa4929e59d1625a0cbd9d840a3858c412e2eb590917f381acd81534d864841bbe5a941504706203411719cd1e52a4290d7cf76a0ffbc68040595803
-
SSDEEP
1536:tC9LgfUnFsz21dO4tY6KHvc+bPU2USzhO3vvw2j:tC9LsUnJ14bE+bcFS1OH/j
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1