General
-
Target
4e867049a92c822ebb1ee2560864342654479f4b9f1f83a30e85db010f548b19
-
Size
428KB
-
Sample
241029-213has1hqq
-
MD5
4d461325bbeae0856b0e5da6d2ddcd2d
-
SHA1
662cf618b59b7cf42df05c5816397dc0f3eae244
-
SHA256
4e867049a92c822ebb1ee2560864342654479f4b9f1f83a30e85db010f548b19
-
SHA512
aee1c1d1afa66db9e0b96e02c61a0b4e28109abf71cd71f39051ab5d052a8d3b4f45418fb2602c18ec279379dafc4764ae158f1013b00437764c59cf94a0d45a
-
SSDEEP
12288:QjXd/ne4euAHvPx3poJwMQV42cLQgwofY4+KncR6xf:QLhe4+nx3poJlQ22C/w4+dRU
Static task
static1
Behavioral task
behavioral1
Sample
List.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
savelat19847.duckdns.org:7000
c4SWD4cHmW81lRzT
-
install_file
USB.exe
Targets
-
-
Target
List.exe
-
Size
2.8MB
-
MD5
312763f784a6713a2fbb53dbe1288e80
-
SHA1
f1b9b4dc31b56d0a8ff6ddbce6936ea377d54bdf
-
SHA256
3a06f3c9bee34204cd0b69bb08d88080cab2d4248a7ea8cd2e83d777972ca81d
-
SHA512
04b5d3a5ec761f0fa1a13f151a6a0a9f93430eddb5708d5699e660e4eb718f0d7ceb44966e0f64b838ee25bbcff44dde7aa3fe2ea33d05c3d446f05a0116ab2a
-
SSDEEP
12288:zd6dAAwnW4eu6HD7x3psJwOQr42cLsgwWfEA+WnqR6Xo:GA3W4onx3psJJQ82CjwY+pRl
-
Detect Xworm Payload
-
Xenarmor family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1