General
-
Target
ea5c93dc24d9407736ffb3beda385f0f42eb682f6a654f9891c09f754560a973.exe
-
Size
78KB
-
Sample
241110-dqagrsybqk
-
MD5
a8cc2daff88948c5943b0f929ec9486c
-
SHA1
7ccc506bc46d2887a5d4ded2df5caaac4a6f0203
-
SHA256
ea5c93dc24d9407736ffb3beda385f0f42eb682f6a654f9891c09f754560a973
-
SHA512
a965155303de05a89954ebdb53a2a7cee7adc5de0bab55cdb1bda179a321ea93121d932acf7dc87a77cda64962bc8a445da59933492cc945b38c0e7d118802ba
-
SSDEEP
1536:J6KAswl3j+aQRiS2/rmmnx/7MZubpd9zQDACmqGn0LX790kCX+dgp:J6OD6jzxjPLxUACS0LtCFp
Static task
static1
Behavioral task
behavioral1
Sample
ea5c93dc24d9407736ffb3beda385f0f42eb682f6a654f9891c09f754560a973.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea5c93dc24d9407736ffb3beda385f0f42eb682f6a654f9891c09f754560a973.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
server2025.dns.army:7771
-
Install_directory
%AppData%
-
install_file
system32.exe
Targets
-
-
Target
ea5c93dc24d9407736ffb3beda385f0f42eb682f6a654f9891c09f754560a973.exe
-
Size
78KB
-
MD5
a8cc2daff88948c5943b0f929ec9486c
-
SHA1
7ccc506bc46d2887a5d4ded2df5caaac4a6f0203
-
SHA256
ea5c93dc24d9407736ffb3beda385f0f42eb682f6a654f9891c09f754560a973
-
SHA512
a965155303de05a89954ebdb53a2a7cee7adc5de0bab55cdb1bda179a321ea93121d932acf7dc87a77cda64962bc8a445da59933492cc945b38c0e7d118802ba
-
SSDEEP
1536:J6KAswl3j+aQRiS2/rmmnx/7MZubpd9zQDACmqGn0LX790kCX+dgp:J6OD6jzxjPLxUACS0LtCFp
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1