General
-
Target
066ea1397f09fed558600e6c4bc7c1e4.bin
-
Size
459KB
-
Sample
241108-bcyaka1grq
-
MD5
2b909f0df0aadd2f76e77c6beb26006a
-
SHA1
c71c2380b7ae39756664bfb97253bcd5ea98c11b
-
SHA256
59129c41eeabcc689986b80f9e4f6334a72b6557b0d56d0d185f803e26f4b6c4
-
SHA512
4cfedd521aebfa23e283c8eef49c2429e766aebb58567fa7d29c42bd7adb28ceb8fd068e739eb1334cab879daf38647b703418116802bc2a4057bc9bf5abf211
-
SSDEEP
12288:4fCsMVFPn2r/b/Kr6ixVwVMLUudI8zyRtF+hKQ8YaRV0:4fCsMVNnaj66qKoVdI0yd8KQQk
Static task
static1
Behavioral task
behavioral1
Sample
295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
SF5USQEmssTrQl4w
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/4iZFGLTi
Targets
-
-
Target
295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528.exe
-
Size
564KB
-
MD5
066ea1397f09fed558600e6c4bc7c1e4
-
SHA1
059f84529641a772f564f0afa890fd4260ec3a06
-
SHA256
295a1fe5ff733dde577267491fa637a43dfb21930c60e996121eeec21d98d528
-
SHA512
d9a494a860ab21f59b405c48343a805f792ed14a9b915decdad3295779f7fb31ab84812a71c99d66838c8c82b37e826f2d66ed9dbfedac0b895e06c9eb8f7fdd
-
SSDEEP
12288:4oSoGX2ry3mFpqjgS+CLuE0Fq7qUckNxxA7WkR:RSoGmr8mFpq8SjLuS7qjkNK
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-