General
-
Target
test1ng.exe
-
Size
54KB
-
Sample
241109-l9yygasepp
-
MD5
729590a97e2de28e11b26074aebdd72e
-
SHA1
24a86696b9aea4b1eb5697be3859d91ef7d66b0c
-
SHA256
ea605539db0de672c170b978aeca949933b6e3623cc25fb6a76a745d0049c259
-
SHA512
2d4629696275e9fd33a3dd271c1445234b9560d89e48511d48d7e7105d0e2274a0e7310a9a7a5bba05b78e085256480960fe67dd3e9af1e814265033598e5f89
-
SSDEEP
1536:uuPL6tJkjNe8U6Ksv/Ukb8nAh0zbOOAxY8Y:uuP+XkyIckbw7zbOOAO8Y
Behavioral task
behavioral1
Sample
test1ng.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
0.tcp.ap.ngrok.io:12725
-
Install_directory
%Public%
-
install_file
hh.exe
Targets
-
-
Target
test1ng.exe
-
Size
54KB
-
MD5
729590a97e2de28e11b26074aebdd72e
-
SHA1
24a86696b9aea4b1eb5697be3859d91ef7d66b0c
-
SHA256
ea605539db0de672c170b978aeca949933b6e3623cc25fb6a76a745d0049c259
-
SHA512
2d4629696275e9fd33a3dd271c1445234b9560d89e48511d48d7e7105d0e2274a0e7310a9a7a5bba05b78e085256480960fe67dd3e9af1e814265033598e5f89
-
SSDEEP
1536:uuPL6tJkjNe8U6Ksv/Ukb8nAh0zbOOAxY8Y:uuP+XkyIckbw7zbOOAO8Y
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1