General
-
Target
Presets.txt
-
Size
2KB
-
Sample
241101-y18sjawngr
-
MD5
3ecac4639c55cc707c5347e6b1f15a20
-
SHA1
a754a2259663cd81d7ddd3dba17abb3a3dc8299b
-
SHA256
e414acaa3554a5b901c5585d233a3ad81cfa9c8e7d0905601c7c12c2716ab8b5
-
SHA512
6a0edd295c5cde87b9ab98f284243b8f43c15833853005cf3ac18aa40c4d7e029d31c2d8e11a1c1deb9dfc877f039f500c7ac2d5bd0fe9b4f81910593419f636
Static task
static1
Malware Config
Extracted
xworm
80.76.49.114:1111
-
Install_directory
%AppData%
-
install_file
Windows.exe
Targets
-
-
Target
Presets.txt
-
Size
2KB
-
MD5
3ecac4639c55cc707c5347e6b1f15a20
-
SHA1
a754a2259663cd81d7ddd3dba17abb3a3dc8299b
-
SHA256
e414acaa3554a5b901c5585d233a3ad81cfa9c8e7d0905601c7c12c2716ab8b5
-
SHA512
6a0edd295c5cde87b9ab98f284243b8f43c15833853005cf3ac18aa40c4d7e029d31c2d8e11a1c1deb9dfc877f039f500c7ac2d5bd0fe9b4f81910593419f636
-
Detect Xworm Payload
-
Xworm family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1