General

  • Target

    Xworm-V5.6.zip

  • Size

    24.5MB

  • Sample

    241004-y3grtstgqk

  • MD5

    5a571707a251e4d8e699c60ff96ae47c

  • SHA1

    0f152472dc47d332b726feb39739118508c36d92

  • SHA256

    43f5eb9bcb505db65f82a064c313e2ead7d6556285a1ad7989e0af5e465770e4

  • SHA512

    8ca1482abacee8cb92146514a83e32185e7c4c169c59634f60e82b81db24f9b87284ee8d45b6a3528339bdce83a8021fdccca64d832b169d5d1cbd3d168b8b37

  • SSDEEP

    393216:pyakq5XFeuBc9Q+Fnqsg5q49DC83v7kjAJgAKbqybloQXo50Ko+Y2ToxY3:pyy5XDBYQwqsGLkjiKp1o5Ho+B

Malware Config

Targets

    • Target

      Xworm-V5.6.zip

    • Size

      24.5MB

    • MD5

      5a571707a251e4d8e699c60ff96ae47c

    • SHA1

      0f152472dc47d332b726feb39739118508c36d92

    • SHA256

      43f5eb9bcb505db65f82a064c313e2ead7d6556285a1ad7989e0af5e465770e4

    • SHA512

      8ca1482abacee8cb92146514a83e32185e7c4c169c59634f60e82b81db24f9b87284ee8d45b6a3528339bdce83a8021fdccca64d832b169d5d1cbd3d168b8b37

    • SSDEEP

      393216:pyakq5XFeuBc9Q+Fnqsg5q49DC83v7kjAJgAKbqybloQXo50Ko+Y2ToxY3:pyy5XDBYQwqsGLkjiKp1o5Ho+B

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks