General
-
Target
GUIสุดโหด.exe
-
Size
1.9MB
-
Sample
241109-awmgqstcmn
-
MD5
0065484c8645d1858fc6d542c5cceac7
-
SHA1
b9e6f410bd59a15c0a89ddb3c06d0ac11ae655f4
-
SHA256
ad7b3092e0b6abb5a978579bf2ebbcd3abde31e3e62ccf1a7c70fa7584885f34
-
SHA512
cec0ea7433e3fa967d521f4d0c66e5a71c55c0230bf9764d4dc9f33acbdd463ea2b11592266af9b2e6767968354f12d93a1a53f3d23dc6961961fbb3dda45661
-
SSDEEP
24576:3VwDp0VIi/j82FYvEsHxmOtX+zDdnLXY0NgBZFHGx:3VI0VIi/KEAac0NgBZF
Static task
static1
Behavioral task
behavioral1
Sample
GUIสุดโหด.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
xworm
85.203.4.149:7000
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Targets
-
-
Target
GUIสุดโหด.exe
-
Size
1.9MB
-
MD5
0065484c8645d1858fc6d542c5cceac7
-
SHA1
b9e6f410bd59a15c0a89ddb3c06d0ac11ae655f4
-
SHA256
ad7b3092e0b6abb5a978579bf2ebbcd3abde31e3e62ccf1a7c70fa7584885f34
-
SHA512
cec0ea7433e3fa967d521f4d0c66e5a71c55c0230bf9764d4dc9f33acbdd463ea2b11592266af9b2e6767968354f12d93a1a53f3d23dc6961961fbb3dda45661
-
SSDEEP
24576:3VwDp0VIi/j82FYvEsHxmOtX+zDdnLXY0NgBZFHGx:3VI0VIi/KEAac0NgBZF
-
Detect Xworm Payload
-
Xworm family
-
Modifies boot configuration data using bcdedit
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1