General
-
Target
file.exe
-
Size
105KB
-
Sample
241105-rj1bha1rgs
-
MD5
edd1f792f4dcfaa2e3cc2cb30ab248e8
-
SHA1
2510594e8f4ba919813be0362e9fd7f0620680da
-
SHA256
7876f0415e0a2c190ea29756895ebff0c1251abf7aaf1061731b8346564ab571
-
SHA512
036bb0b4afeebc2e24675dcbd1973b7a54c70d0a33655b86582a19bfd116a78ba09344aedce2c3718a4ecaf894cd5d496019a8247fd9b8646f0c0c4b5cb30bf5
-
SSDEEP
384:AMjfVU+V4yg3d2xMGJn6BrfKNG99Sjvb99SjvWp:d7XCVMxylB9Sbh9Sb
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Malware Config
Extracted
http://195.2.71.183:8081/0/3.hta
Extracted
xworm
5.0
89.110.95.189:7000
imlO5snuY8Gb0egY
-
install_file
USB.exe
Targets
-
-
Target
file.exe
-
Size
105KB
-
MD5
edd1f792f4dcfaa2e3cc2cb30ab248e8
-
SHA1
2510594e8f4ba919813be0362e9fd7f0620680da
-
SHA256
7876f0415e0a2c190ea29756895ebff0c1251abf7aaf1061731b8346564ab571
-
SHA512
036bb0b4afeebc2e24675dcbd1973b7a54c70d0a33655b86582a19bfd116a78ba09344aedce2c3718a4ecaf894cd5d496019a8247fd9b8646f0c0c4b5cb30bf5
-
SSDEEP
384:AMjfVU+V4yg3d2xMGJn6BrfKNG99Sjvb99SjvWp:d7XCVMxylB9Sbh9Sb
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1