General
-
Target
ff58fce3cca0cbcb18d3be37f8bbb6fd507d84723de229fb1522b84ff029170f.exe
-
Size
691KB
-
Sample
241108-e1by1sxrar
-
MD5
cd0e4ac274a929010fed125c319c3e69
-
SHA1
cc530ce42f9b3024cf491eef61dfbf4dcd905176
-
SHA256
ff58fce3cca0cbcb18d3be37f8bbb6fd507d84723de229fb1522b84ff029170f
-
SHA512
b5fd740e1ceff2a6d999f5e6fb0ac89fc74ce61aa58eae5526ede9ab0001eeecc26ef1ad80d6e501a4121b4e5a2cacd19d7e52488b895b283c26cd1d94ea4c18
-
SSDEEP
12288:qTfdqmnKE2pb57I+xdvCss0BW9T3PG6dWHb:qv2t5s+qj049DGAW7
Static task
static1
Behavioral task
behavioral1
Sample
ff58fce3cca0cbcb18d3be37f8bbb6fd507d84723de229fb1522b84ff029170f.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
3.1
pkaraven.duckdns.org:9387
AXupjNCu673XjSaT
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
ff58fce3cca0cbcb18d3be37f8bbb6fd507d84723de229fb1522b84ff029170f.exe
-
Size
691KB
-
MD5
cd0e4ac274a929010fed125c319c3e69
-
SHA1
cc530ce42f9b3024cf491eef61dfbf4dcd905176
-
SHA256
ff58fce3cca0cbcb18d3be37f8bbb6fd507d84723de229fb1522b84ff029170f
-
SHA512
b5fd740e1ceff2a6d999f5e6fb0ac89fc74ce61aa58eae5526ede9ab0001eeecc26ef1ad80d6e501a4121b4e5a2cacd19d7e52488b895b283c26cd1d94ea4c18
-
SSDEEP
12288:qTfdqmnKE2pb57I+xdvCss0BW9T3PG6dWHb:qv2t5s+qj049DGAW7
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-