General
-
Target
18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7bN
-
Size
564KB
-
Sample
241103-aflkhazblj
-
MD5
31e2c53b5bf4d2dbb52412efbfc8bf00
-
SHA1
4cd7735b817535352add043aae894473976af918
-
SHA256
18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7b
-
SHA512
76acdfab2ff25ec3d52ab30357c55d35977af12057363638e1da614dc8584c4282482e7bad37620894c4349ef921947f34fb44b53531b5c5deea57aa1056ca76
-
SSDEEP
12288:2AYaDPw1Qk89Tmyd+rCiw9DWTXnrCCcVXVz4klvTkR:2+Lw9gTFoQKLVcJ4klO
Static task
static1
Behavioral task
behavioral1
Sample
18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7bN.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
aye2mar280502016.ddns.net:4030
6Ramn2bVtVXcTWn8
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7bN
-
Size
564KB
-
MD5
31e2c53b5bf4d2dbb52412efbfc8bf00
-
SHA1
4cd7735b817535352add043aae894473976af918
-
SHA256
18d6cb03aaa51e60509d37c28b01d36cfb9dc27cbf3824a194096756a779cf7b
-
SHA512
76acdfab2ff25ec3d52ab30357c55d35977af12057363638e1da614dc8584c4282482e7bad37620894c4349ef921947f34fb44b53531b5c5deea57aa1056ca76
-
SSDEEP
12288:2AYaDPw1Qk89Tmyd+rCiw9DWTXnrCCcVXVz4klvTkR:2+Lw9gTFoQKLVcJ4klO
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-