General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
http://87.120.117.209/coinbase.exe
Extracted
Family
xworm
Version
5.0
C2
87.120.117.209:7000
Mutex
U2y4hALpuDGJOJr0
Attributes
-
install_file
USB.exe
aes.plain
Targets
-
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-