General
-
Target
cd9afdef9b69b501d2767b70792a481f1c768ba3585a53de167703fe250ab2b4
-
Size
380KB
-
Sample
241031-vrtqga1gqg
-
MD5
04ac6e542ab1da8613a95d2ba96ea42c
-
SHA1
9ebeb2b6202298943f9af83c7d21770573b0051a
-
SHA256
cd9afdef9b69b501d2767b70792a481f1c768ba3585a53de167703fe250ab2b4
-
SHA512
26d7c28b31099f401280b05b261ef93aae34288bec0e3ec98dbc2de68a3d447e9be175073988bcfdd694c04fc680dab33febac1c21af2741830c8f9218e4774a
-
SSDEEP
6144:+QIdxXoTEXCwa9c8Ls28E9DUzymHe2gKGZ66Db13Zc7tNvo2fVHY5E1Cj+BzsJnY:+Q4xXoTEXCwOHkVzle2FYbFo02fVGEH7
Static task
static1
Behavioral task
behavioral1
Sample
XBASS.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
savelat19847.duckdns.org:7000
69DII5G7d5Uac5Kb
-
install_file
USB.exe
Targets
-
-
Target
XBASS.exe
-
Size
1.5MB
-
MD5
638e5f44f917de3b3b3473aafbde50b1
-
SHA1
8f48986374bcac52c2df6268bc0456864bbca12f
-
SHA256
7a0edc7a5d067e8df9bf44c4ef85d0e0bd9b4ae09a4569737480d1ca861f05e1
-
SHA512
62f916f131c65096c91c1674ed85e2903648f2c1772e785cc34d1bb9c40bb0126f0e3e1a3c0eb5e670d567a57db27af71fcb45658d38ee9c28792ce89256c637
-
SSDEEP
12288:jm6xXKTEXCwEapqeQYl+3e+C6HLn0E7C6P/:ZK4xqepl+3Vb00C6P/
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4