General
-
Target
NEXUS MULTI TOOL COMEBACK.exe
-
Size
9.7MB
-
Sample
241109-s2kt7swmcz
-
MD5
cd65d3bad3a37d4dd85b95ddd6bcfe09
-
SHA1
1509122389d11f5fa0511544feace0fb42681f5e
-
SHA256
59529f95dc9a1b17af941ecf2543d611dbbf658a816966748d1959c88adf3512
-
SHA512
2d98fc40b0c21350594675f8e8e8186d4f017eb5a1519fb8b15b5646c7818d9f0a91e109f126ede4d9215617b49d244dc2e7000053f876afd6ffab32126d579d
-
SSDEEP
196608:eB3QIp2Bp4fhMw+Ebd0iji6nxg3IO0B/BngQSlbHZAlB7/e3:emIkBp4fhfoijiUxcI/UQQHZAH
Static task
static1
Behavioral task
behavioral1
Sample
NEXUS MULTI TOOL COMEBACK.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
foreign-olympic.gl.at.ply.gg:99
147.185.221.23:99
127.0.0.1:99
foreign-olympic.gl.at.ply.gg:21710
147.185.221.23:21710
-
Install_directory
%Userprofile%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070
Targets
-
-
Target
NEXUS MULTI TOOL COMEBACK.exe
-
Size
9.7MB
-
MD5
cd65d3bad3a37d4dd85b95ddd6bcfe09
-
SHA1
1509122389d11f5fa0511544feace0fb42681f5e
-
SHA256
59529f95dc9a1b17af941ecf2543d611dbbf658a816966748d1959c88adf3512
-
SHA512
2d98fc40b0c21350594675f8e8e8186d4f017eb5a1519fb8b15b5646c7818d9f0a91e109f126ede4d9215617b49d244dc2e7000053f876afd6ffab32126d579d
-
SSDEEP
196608:eB3QIp2Bp4fhMw+Ebd0iji6nxg3IO0B/BngQSlbHZAlB7/e3:emIkBp4fhfoijiUxcI/UQQHZAH
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-