General
-
Target
1a7d261601e4bbc160e9b96db9320d6594665aa94a8827b2e749beadd89b7590
-
Size
59KB
-
Sample
241101-xnmh4atgkc
-
MD5
91b5e8f0f941632476acdb56dd13c598
-
SHA1
34a051be4b40fa273deb322d3f6827138068e800
-
SHA256
1a7d261601e4bbc160e9b96db9320d6594665aa94a8827b2e749beadd89b7590
-
SHA512
7a10c304d120c71cd3b5b7e97414b3b8feb4aafc6a05a4e7d0914e1f69fdd9f717e36d063e8f0adc3d4192af69743e0c9778569bdcf8883d167f6fcb151cd3c6
-
SSDEEP
1536:bhE2m1pT2lxGjnTd8WUeyQQl/kbrLLAAwQU0DOdN5dx/:tEp6lxinTuWHyQskbPL+IOdpx/
Behavioral task
behavioral1
Sample
1a7d261601e4bbc160e9b96db9320d6594665aa94a8827b2e749beadd89b7590.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1a7d261601e4bbc160e9b96db9320d6594665aa94a8827b2e749beadd89b7590.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
193.233.255.106:69
-
Install_directory
%AppData%
-
install_file
System.exe
-
telegram
https://api.telegram.org/bot7678901257:AAENkDGBF25IbXLdzfMeaD-OMDGJWC2_KRQ/sendMessage?chat_id=7813784541
Targets
-
-
Target
1a7d261601e4bbc160e9b96db9320d6594665aa94a8827b2e749beadd89b7590
-
Size
59KB
-
MD5
91b5e8f0f941632476acdb56dd13c598
-
SHA1
34a051be4b40fa273deb322d3f6827138068e800
-
SHA256
1a7d261601e4bbc160e9b96db9320d6594665aa94a8827b2e749beadd89b7590
-
SHA512
7a10c304d120c71cd3b5b7e97414b3b8feb4aafc6a05a4e7d0914e1f69fdd9f717e36d063e8f0adc3d4192af69743e0c9778569bdcf8883d167f6fcb151cd3c6
-
SSDEEP
1536:bhE2m1pT2lxGjnTd8WUeyQQl/kbrLLAAwQU0DOdN5dx/:tEp6lxinTuWHyQskbPL+IOdpx/
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1