General
-
Target
1ade097499dd5fb334ffe69d06d00b31.bin
-
Size
101KB
-
Sample
241102-vqak7s1ann
-
MD5
3275f275faff10b921b700db2348ce80
-
SHA1
da4b3367957ae701632699ddb70394e731213f02
-
SHA256
dd613b3cad5815102a816ec70b1518d413c7e2998be64a49eecd5f14b28d42ed
-
SHA512
72fdd4297a62839f7d0a673bcf7f62c95719df553e1467f76acd547d67a58a6224caf68d62a5032975a2ca43156b76644ef3e81cd5c7333b0124b22938b5d0e9
-
SSDEEP
3072:lHaVEoRaOTGza5oPM4kqd/EEukg2CDrXJor1quOhK:fQ7TYlRZukg2CDrXer1N
Behavioral task
behavioral1
Sample
fa5a74ef1355ddd1d5984b84d52d7aa0727e11e40a89ca3a2bbf4594eea57730.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
fa5a74ef1355ddd1d5984b84d52d7aa0727e11e40a89ca3a2bbf4594eea57730.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
topics-junior.at.ply.gg:45283
-
Install_directory
%AppData%
-
install_file
msedge.exe
Targets
-
-
Target
fa5a74ef1355ddd1d5984b84d52d7aa0727e11e40a89ca3a2bbf4594eea57730.exe
-
Size
158KB
-
MD5
1ade097499dd5fb334ffe69d06d00b31
-
SHA1
ab5e0d3a2e0a71b2afe9a04bd24835a8f5874079
-
SHA256
fa5a74ef1355ddd1d5984b84d52d7aa0727e11e40a89ca3a2bbf4594eea57730
-
SHA512
b35aec83bbf5e0501a706df42db4db1b077acf88e37a4d6c65b52c83f24db0e0eb33fad9f22f0a847a14f6540419d85e24062f9c65a2a6d96db5ab20d315598e
-
SSDEEP
3072:6vpWpop9+bNFwwO52HJe5BV0bUniyimyx:IVpkbEaJe5v0bURy
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1