General
-
Target
android-evon-mobile-executor-roblox-download
-
Size
9KB
-
Sample
241011-1f2vlazdlr
-
MD5
7f8ee050d779dd287baec89600d7c92d
-
SHA1
0757aad5e1e59d165b3b335cb630c1c77e6c177e
-
SHA256
1ab3ff2824b6f74e483449230b9f9ccf1c4ef45b787ab2753c1648c9c32a7b5c
-
SHA512
02c2041ce5cd33671ba53f5d6cf272debd45928c8b5ca93f4b8eb62a9203117504af10c2a1c1de031cb739007271e1210de79f89d0135e18f71ba00f23ff0dd3
-
SSDEEP
192:PN2x2BMup0UJklqjKYzCAoDqkvKa5z73FzysN:AxpuKOkMjVNoGMftBTN
Static task
static1
Malware Config
Extracted
xworm
3.0
mini-jungle.at.ply.gg:3499
-
install_file
USB.exe
Targets
-
-
Target
android-evon-mobile-executor-roblox-download
-
Size
9KB
-
MD5
7f8ee050d779dd287baec89600d7c92d
-
SHA1
0757aad5e1e59d165b3b335cb630c1c77e6c177e
-
SHA256
1ab3ff2824b6f74e483449230b9f9ccf1c4ef45b787ab2753c1648c9c32a7b5c
-
SHA512
02c2041ce5cd33671ba53f5d6cf272debd45928c8b5ca93f4b8eb62a9203117504af10c2a1c1de031cb739007271e1210de79f89d0135e18f71ba00f23ff0dd3
-
SSDEEP
192:PN2x2BMup0UJklqjKYzCAoDqkvKa5z73FzysN:AxpuKOkMjVNoGMftBTN
-
Detect Xworm Payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1