General
-
Target
niggerrr.exe
-
Size
71KB
-
Sample
241003-s95vcatbqj
-
MD5
2b3441d27d8a96970ea867ab84cef2e7
-
SHA1
54916a2729755a39d080cb48617fb08217141475
-
SHA256
f6228a8e5e1e92dd2bfa5b193ff2b0975d5f9e883e73eaa61271e682016dbeac
-
SHA512
173c22c05093bef0e38d391a727fd075dc42771b09a5e2b16e8f54d380c98e2cc4440810c63e47bdded885107e2e231f13136a84e892cbb70e40f2945a23e2b9
-
SSDEEP
1536:j7BMt05k2bN0i0q/y2uJaloU0+bgwju0AQzJyk+8yOerQivaaSGW:j7B605tSi3D0+bzByj8yOUTvpW
Behavioral task
behavioral1
Sample
niggerrr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
niggerrr.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
thread-advanced.gl.at.ply.gg:4794
176.208.33.209:4794
-
Install_directory
%AppData%
-
install_file
Niggerrrr.exe
Targets
-
-
Target
niggerrr.exe
-
Size
71KB
-
MD5
2b3441d27d8a96970ea867ab84cef2e7
-
SHA1
54916a2729755a39d080cb48617fb08217141475
-
SHA256
f6228a8e5e1e92dd2bfa5b193ff2b0975d5f9e883e73eaa61271e682016dbeac
-
SHA512
173c22c05093bef0e38d391a727fd075dc42771b09a5e2b16e8f54d380c98e2cc4440810c63e47bdded885107e2e231f13136a84e892cbb70e40f2945a23e2b9
-
SSDEEP
1536:j7BMt05k2bN0i0q/y2uJaloU0+bgwju0AQzJyk+8yOerQivaaSGW:j7B605tSi3D0+bzByj8yOUTvpW
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1