General
-
Target
wilde.exe.bin.exe
-
Size
6KB
-
Sample
241104-q88hqszmhw
-
MD5
45580bbbbad94be86fb0e2062af79fb8
-
SHA1
0599518ee61f4ac8453f8ff147110686fc0afc02
-
SHA256
97050c3d3a76780973410f615d77a64e2f2683a20328bc880a89300aa8110521
-
SHA512
2d6f7500d789b59c4bede099243150b6460f232de12f67f33b290f399b147f47fe645e491d5a0f031aced8ac5a268c202db9673b1dd322c6e2196022690e17b2
-
SSDEEP
48:6MP5kBZOKrnlVCsYRUY9BjP0GbulgwIHhIBo71jNM4+1GbVgZs2rXVjbyxCtDDl:tKrlVCsY9BTalCH7CHNrXVjBq0zNt
Static task
static1
Behavioral task
behavioral1
Sample
wilde.exe.bin.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:44495
death-manor.gl.at.ply.gg:44495
-
install_file
USB.exe
Targets
-
-
Target
wilde.exe.bin.exe
-
Size
6KB
-
MD5
45580bbbbad94be86fb0e2062af79fb8
-
SHA1
0599518ee61f4ac8453f8ff147110686fc0afc02
-
SHA256
97050c3d3a76780973410f615d77a64e2f2683a20328bc880a89300aa8110521
-
SHA512
2d6f7500d789b59c4bede099243150b6460f232de12f67f33b290f399b147f47fe645e491d5a0f031aced8ac5a268c202db9673b1dd322c6e2196022690e17b2
-
SSDEEP
48:6MP5kBZOKrnlVCsYRUY9BjP0GbulgwIHhIBo71jNM4+1GbVgZs2rXVjbyxCtDDl:tKrlVCsY9BTalCH7CHNrXVjBq0zNt
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-