General
-
Target
04ebe4c2a2397fd72ba719c24aae0a682f430dfcfd1487ef41d9a26d129323fd
-
Size
440KB
-
Sample
241106-nagagsyjhz
-
MD5
49066ab2f037541899316720017224a5
-
SHA1
92c1cf879956b72512532e0a3d1220bd21a00ecc
-
SHA256
04ebe4c2a2397fd72ba719c24aae0a682f430dfcfd1487ef41d9a26d129323fd
-
SHA512
ccfcde2f4258855a4729ca9234a4f9b4ff1c64d3da00a87457c7b3485ba2dc1f8dde8eed96d9d655da8adb6700df099d4991f8f94e894c857d23c526d806f655
-
SSDEEP
12288:do3b//GgX/cZpe6ZQtxAA2MbmGP9DqtgNg5:doDl/cv8tKTMbmEQ5
Static task
static1
Behavioral task
behavioral1
Sample
payment.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
45.149.241.217:7000
ir8qgmTYaaTz9RIP
-
install_file
USB.exe
Targets
-
-
Target
payment.exe
-
Size
478KB
-
MD5
1db8a24af26be22dfbdfa94f2557044b
-
SHA1
7f6f8a15fe47b5ba205e5f09c82c80296ac57e4e
-
SHA256
9ca715647dc7025d4ea21adc4a9eda922d8d8d17397d4751026397b4e44ec5b4
-
SHA512
e0fa830452b183b252de64cbaa39abd65c7b8c24517694a618abbf0ea56bbed00bd417f84b2c29b350126a6e3c29582787c3eb7296816bb62554e8b83fbefc38
-
SSDEEP
12288:T2PJbEeX/Se2Zu/ZAeJBcRMibOOASlCDkR:T2Px//SlWBcOibOOf
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-