General
-
Target
8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30N
-
Size
70KB
-
Sample
241110-pvvt2szmgr
-
MD5
01417d75f6d4f4e43ab50301bdfed600
-
SHA1
f71eb0c0c8e43f82338f2ea45b41a434836f77c4
-
SHA256
8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30
-
SHA512
3ae6831b2aa620f262f2d7c23194b66cb52eccbd955ee8f2b5ce7cfd3e53f85070000f98a301ec67f4f0426284bd5fdf0c135533fe3c041493781dac91cbe6ac
-
SSDEEP
1536:ujXe7voXuNLagsO7hdXvxY+CbTX9R6l4OAy8AjubP:E6wXuNLagsO1dpY+CbTtNOB8AQP
Behavioral task
behavioral1
Sample
8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
192.168.0.3:3389
184.190.169.22:3389
192.168.0.8:3389
192.168.0.7:3389
-
Install_directory
%ProgramData%
-
install_file
Microsoft OneDrive.exe
Targets
-
-
Target
8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30N
-
Size
70KB
-
MD5
01417d75f6d4f4e43ab50301bdfed600
-
SHA1
f71eb0c0c8e43f82338f2ea45b41a434836f77c4
-
SHA256
8327399d458913b2f8b9b8d5b53d38390ba01842747eb701cc75486e57df1d30
-
SHA512
3ae6831b2aa620f262f2d7c23194b66cb52eccbd955ee8f2b5ce7cfd3e53f85070000f98a301ec67f4f0426284bd5fdf0c135533fe3c041493781dac91cbe6ac
-
SSDEEP
1536:ujXe7voXuNLagsO7hdXvxY+CbTX9R6l4OAy8AjubP:E6wXuNLagsO1dpY+CbTtNOB8AQP
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-