General
-
Target
bc52fd4f33693de583c71f980d5b61ec2991ffdb915da00d2b52eec109ef1b17
-
Size
428KB
-
Sample
241031-tg4x1s1fmm
-
MD5
fe30074034015e24ef8e0e4e2305383b
-
SHA1
aed3115c8d403e8edbde539786524a5bf166fd5b
-
SHA256
bc52fd4f33693de583c71f980d5b61ec2991ffdb915da00d2b52eec109ef1b17
-
SHA512
902944eaecdddf441e9dc360aafdd1eea4d02c294203a2405528e766a0d2b234591bd21092f9139348c695498d886ca97dee830b5d5b29a0193eabc406ce8108
-
SSDEEP
12288:w2x+xZf8ViBo/DGt1u85/qCkE33Rf9RYmllX7jQQ53:w2x410rI1CCHnRf9HHkQ
Static task
static1
Behavioral task
behavioral1
Sample
LIST.ITEMS.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
3.1
savelat19847.duckdns.org:7000
sL1COlJF2Dst73el
-
install_file
USB.exe
Targets
-
-
Target
LIST.ITEMS.exe
-
Size
556KB
-
MD5
d7c03169dbdd363163dbfc5119738c61
-
SHA1
e51f6fe9f9422c054d7b33e949981239ef3355eb
-
SHA256
c304f5610e7059e7eb2100f0de1e6c1bbeeaa75d746f75e3561eee5b7fb0ac92
-
SHA512
bbf5eba23c466a478ec381c127a70fc8e1ca7e0b744cf89606341df918b2d40c5c71f29a1f19532c5a83f886e75393e3744d9ae4f4b9862af22d08e596978dec
-
SSDEEP
12288:qI/rXQ9TZwetjcQaBJLJ/yd4bIhX3KVaV910N4VtndapxbzVykR:/atjdSJ/HIhHKa9GNitApVzr
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-