General
-
Target
4027dbb9777d42ebd7737bd906747b091139debe7f2f11b094ed1c13758971e7
-
Size
35KB
-
Sample
241105-kcxtgazqgk
-
MD5
144f398d59c44e3c5a5ed28b8ba1918a
-
SHA1
9adc52e3f04aa4f92cb288a02968526806b23ac8
-
SHA256
4027dbb9777d42ebd7737bd906747b091139debe7f2f11b094ed1c13758971e7
-
SHA512
8f883b6235a956200396553a6338d9619fed8811d93993578b38175df050502840199894065d5b6df770b364a99ce6139dbe9c938aa91bc69470eea57b26fa00
-
SSDEEP
768:jDMfF7zLKYs2Byj5MuddqLi9Fk9wFO/hY/22N:jkF7HKYs/1hd9Fk9wFO/Ku2N
Behavioral task
behavioral1
Sample
4027dbb9777d42ebd7737bd906747b091139debe7f2f11b094ed1c13758971e7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4027dbb9777d42ebd7737bd906747b091139debe7f2f11b094ed1c13758971e7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
nomorelife1.ddns.net:999
RQyA6qFjTisp9KB8
-
Install_directory
%AppData%
-
install_file
System.exe
Targets
-
-
Target
4027dbb9777d42ebd7737bd906747b091139debe7f2f11b094ed1c13758971e7
-
Size
35KB
-
MD5
144f398d59c44e3c5a5ed28b8ba1918a
-
SHA1
9adc52e3f04aa4f92cb288a02968526806b23ac8
-
SHA256
4027dbb9777d42ebd7737bd906747b091139debe7f2f11b094ed1c13758971e7
-
SHA512
8f883b6235a956200396553a6338d9619fed8811d93993578b38175df050502840199894065d5b6df770b364a99ce6139dbe9c938aa91bc69470eea57b26fa00
-
SSDEEP
768:jDMfF7zLKYs2Byj5MuddqLi9Fk9wFO/hY/22N:jkF7HKYs/1hd9Fk9wFO/Ku2N
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1