General
-
Target
5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357.exe
-
Size
1.3MB
-
Sample
241017-byfmmsvdrg
-
MD5
1b99f0bf9216a89b8320e63cbd18a292
-
SHA1
6a199cb43cb4f808183918ddb6eadc760f7cb680
-
SHA256
5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357
-
SHA512
02b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382
-
SSDEEP
24576:J64p16BppRskYGC/cJUE7P6nxhpBaTn+CC6YtGz:JzpEBrRb4MonrpATDcUz
Static task
static1
Behavioral task
behavioral1
Sample
5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
104.219.239.11:6969
QMHDjhLW52nOcp4a
-
Install_directory
%AppData%
-
install_file
OneDrive.exe
-
telegram
https://api.telegram.org/bot5372344229:AAEM46DF5hWBLPbN5UErJaoJvlNvm-ZJXyg
Targets
-
-
Target
5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357.exe
-
Size
1.3MB
-
MD5
1b99f0bf9216a89b8320e63cbd18a292
-
SHA1
6a199cb43cb4f808183918ddb6eadc760f7cb680
-
SHA256
5275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357
-
SHA512
02b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382
-
SSDEEP
24576:J64p16BppRskYGC/cJUE7P6nxhpBaTn+CC6YtGz:JzpEBrRb4MonrpATDcUz
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1