General
-
Target
DeadPayload.exe
-
Size
500KB
-
Sample
241031-kxkpmswajp
-
MD5
d6aa8be4d3e01013711974b9e0213600
-
SHA1
9d26eccfb6d7455a76c0a41eba38578aaf2d41c0
-
SHA256
039a630b2f6139fd5f1db717f03e372a12c489ec22c1a92d750fbfcb83c17069
-
SHA512
a95e7edb2a0cda6c7d06b84ac165d843c64c6a1e344319ba3cf3d7d7f2790ae56f7d02f21c9e082d50604493479c0eca5f5b1cc2cd8cdfbc21aa9b65b3079ca3
-
SSDEEP
12288:83DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sdzO:2kGTy
Static task
static1
Behavioral task
behavioral1
Sample
DeadPayload.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
QgVg78qW15uIsQ4H
-
Install_directory
%Public%
-
install_file
ohh.exe
-
pastebin_url
https://pastebin.com/raw/J09JweeH
Targets
-
-
Target
DeadPayload.exe
-
Size
500KB
-
MD5
d6aa8be4d3e01013711974b9e0213600
-
SHA1
9d26eccfb6d7455a76c0a41eba38578aaf2d41c0
-
SHA256
039a630b2f6139fd5f1db717f03e372a12c489ec22c1a92d750fbfcb83c17069
-
SHA512
a95e7edb2a0cda6c7d06b84ac165d843c64c6a1e344319ba3cf3d7d7f2790ae56f7d02f21c9e082d50604493479c0eca5f5b1cc2cd8cdfbc21aa9b65b3079ca3
-
SSDEEP
12288:83DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sdzO:2kGTy
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-