General
-
Target
scvhost.exe
-
Size
42KB
-
Sample
241102-xyq92asmd1
-
MD5
4171f38c413ee527c699d6a124738bec
-
SHA1
65db2ecf73416a1c75107ed0bdb40f9072033167
-
SHA256
e1b83b2921ffbccb583adc624492872331f6e029c35c880b24940a4d8526c7dd
-
SHA512
4f0752f5fa6b6b98948d5770b69501e8c5a5edac1cc25ef49ac904428fb178199d53aef92aa93411d88df60c3270188710f29a87e2e599b307bbfde943f2d0e7
-
SSDEEP
768:eEGcr3BbT4UAd29etN8cuGgFFRPy9dN6TO5hiW5y:xTrR/RI9IF09dN6TO5kh
Behavioral task
behavioral1
Sample
scvhost.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
scvhost.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
192.168.0.3:3389
184.190.169.22:3389
192.168.0.8:3389
192.168.0.7:3389
wb34QNtoOY5wHRBe
-
Install_directory
%ProgramData%
-
install_file
Microsoft OneDrive.exe
Targets
-
-
Target
scvhost.exe
-
Size
42KB
-
MD5
4171f38c413ee527c699d6a124738bec
-
SHA1
65db2ecf73416a1c75107ed0bdb40f9072033167
-
SHA256
e1b83b2921ffbccb583adc624492872331f6e029c35c880b24940a4d8526c7dd
-
SHA512
4f0752f5fa6b6b98948d5770b69501e8c5a5edac1cc25ef49ac904428fb178199d53aef92aa93411d88df60c3270188710f29a87e2e599b307bbfde943f2d0e7
-
SSDEEP
768:eEGcr3BbT4UAd29etN8cuGgFFRPy9dN6TO5hiW5y:xTrR/RI9IF09dN6TO5kh
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-