General
-
Target
xwo.exe
-
Size
189KB
-
Sample
241105-tws43axjgq
-
MD5
7949220a0b341111716a81695324be27
-
SHA1
d79653b53e3affa5081d25cdea077299105d0472
-
SHA256
a22f6db007744f7768782280e66832487b3b193ff20825203bb56210b7c4e923
-
SHA512
e051e96a0334ce6cc7b6a43dffebfdcf93b40824db9cec64c6a2e71aed24bd26232645edbac14a47afe02fb0d12384da9648ea402df9232892330afce91fe303
-
SSDEEP
3072:jqWg0oaxBGieuvQTtv6c/mTRPyZqqiIdhI+czv/gJQE7zK+l+2aVtUq9JosKh:jgP8GiHvQTV+d/qi25eKfU2cDJ18
Static task
static1
Behavioral task
behavioral1
Sample
xwo.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
xwo.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
husktools.duckdns.org:7000
9W5nR6YNY2Cs1cQg
-
Install_directory
%Userprofile%
-
install_file
XClient.exe
Targets
-
-
Target
xwo.exe
-
Size
189KB
-
MD5
7949220a0b341111716a81695324be27
-
SHA1
d79653b53e3affa5081d25cdea077299105d0472
-
SHA256
a22f6db007744f7768782280e66832487b3b193ff20825203bb56210b7c4e923
-
SHA512
e051e96a0334ce6cc7b6a43dffebfdcf93b40824db9cec64c6a2e71aed24bd26232645edbac14a47afe02fb0d12384da9648ea402df9232892330afce91fe303
-
SSDEEP
3072:jqWg0oaxBGieuvQTtv6c/mTRPyZqqiIdhI+czv/gJQE7zK+l+2aVtUq9JosKh:jgP8GiHvQTV+d/qi25eKfU2cDJ18
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1