General
-
Target
a4a812445d1364563e7c1e852f23319514bba1e5ac38e3386bc77acda6f3ec51.zip
-
Size
7.7MB
-
Sample
241105-enqxeavdqk
-
MD5
90fe88837d68c504b2ba4fa1e36f23fa
-
SHA1
97c1874be635b8a497a6ab2113a7f262ae5b6a3f
-
SHA256
a4a812445d1364563e7c1e852f23319514bba1e5ac38e3386bc77acda6f3ec51
-
SHA512
debc2a6223a10c408e230a2f4b5e7438da5da8516b5e0a924451630ac16ae397778ad7faa72293d2f7959a6144347e324dfbbde73d3bb2f9c396060f3f2a8f72
-
SSDEEP
196608:SSxH7QBjr68Y/tqN1OgspyvSvmdQem2wKyi1BGDM0qDVUb:SSxoY/tqbEQaYEDMBUb
Behavioral task
behavioral1
Sample
dist/sdfysdfa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dist/sdfysdfa.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
109.206.246.102:3387
MlpCbb9Z3AhhmnSA
-
Install_directory
%AppData%
-
install_file
骇客开发.exe
Targets
-
-
Target
dist/sdfysdfa.exe
-
Size
7.6MB
-
MD5
072e4116922c55a0acb83c6d7dbbb8e6
-
SHA1
22c700bbddfecd3e0a157fc2182f1f62cb64f96b
-
SHA256
f6199b227874bd24a02cfdead551441aebb9b6284aace5ffa9665db7b7651c92
-
SHA512
8d6dce2a006dc4435443f5ca8b91257246b123fce3cbae9d2b3fa3cec8306aafa8314f2918569c2694c8429706a2e56133eeb1c773882b6f3eb0b3300356c3d6
-
SSDEEP
196608:TQJY0aVhTDfyGR21X5Sp6GemDMPwQaYWhSiMRVA:qY0aVBDfDspfaMPgS1A
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1