General
-
Target
TexPerm.exe
-
Size
11.2MB
-
Sample
241009-3gjfrawhqj
-
MD5
edd32d80dd14f84c7924e4af2953ba9e
-
SHA1
0caf3a1acc853056616d9348aa93e8c0e11e3e99
-
SHA256
95144e30ef6994482dd42a0ca261014bb9e2d3a3ca3520057918f6c1d4011a84
-
SHA512
69e2eb5b81f2b4060eca0b66c88eb30c7f8936adce48bb4fe38bfeefd34d7ed0d152463d26c21dd159888f263d23a4206f0c332e24bce8f6e8a1d00ae221f063
-
SSDEEP
196608:84ukkzY1CYQC8H6PWla1FsJ2kdEimSkXrXhUCrcfUUYuH+wDaLs5:84uBY1CY58H6f1FnkdRQbXhUCQcQm2
Static task
static1
Behavioral task
behavioral1
Sample
TexPerm.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
78.69.106.17:8000
-
Install_directory
%AppData%
-
install_file
Update.exe
Targets
-
-
Target
TexPerm.exe
-
Size
11.2MB
-
MD5
edd32d80dd14f84c7924e4af2953ba9e
-
SHA1
0caf3a1acc853056616d9348aa93e8c0e11e3e99
-
SHA256
95144e30ef6994482dd42a0ca261014bb9e2d3a3ca3520057918f6c1d4011a84
-
SHA512
69e2eb5b81f2b4060eca0b66c88eb30c7f8936adce48bb4fe38bfeefd34d7ed0d152463d26c21dd159888f263d23a4206f0c332e24bce8f6e8a1d00ae221f063
-
SSDEEP
196608:84ukkzY1CYQC8H6PWla1FsJ2kdEimSkXrXhUCrcfUUYuH+wDaLs5:84uBY1CY58H6f1FnkdRQbXhUCQcQm2
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3