General
-
Target
99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861
-
Size
7.9MB
-
Sample
241104-wbzgfswrfm
-
MD5
626b15a696ab0909a6a2f73bc50d1f9b
-
SHA1
0e7f8f49236828da8586d5d779e46e454509e80f
-
SHA256
99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861
-
SHA512
56c6feb457e1894a6dd4b79cb19acc62036203be58c588bf09e88c359a5346b909a538112053ca42f2301b04a9bcc1ea02e3d77b7ebc484b80523879a0b2fd03
-
SSDEEP
196608:mLO9Y0aVhTDfyGR21X5Sp6GemDMPwQaYWhSiMRVA:39Y0aVBDfDspfaMPgS1A
Behavioral task
behavioral1
Sample
99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
109.206.246.102:3387
MlpCbb9Z3AhhmnSA
-
Install_directory
%AppData%
-
install_file
骇客开发.exe
Targets
-
-
Target
99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861
-
Size
7.9MB
-
MD5
626b15a696ab0909a6a2f73bc50d1f9b
-
SHA1
0e7f8f49236828da8586d5d779e46e454509e80f
-
SHA256
99ebce7090f154162b599e5f7142593e80555e46d32f23a3c3323f1bbed1d861
-
SHA512
56c6feb457e1894a6dd4b79cb19acc62036203be58c588bf09e88c359a5346b909a538112053ca42f2301b04a9bcc1ea02e3d77b7ebc484b80523879a0b2fd03
-
SSDEEP
196608:mLO9Y0aVhTDfyGR21X5Sp6GemDMPwQaYWhSiMRVA:39Y0aVBDfDspfaMPgS1A
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1