General
-
Target
Roblox cheat.exe
-
Size
71KB
-
Sample
241111-1xcxsswqct
-
MD5
f24d23861ae25a5e29ed07ce2edf23ae
-
SHA1
f44fb5843e43b04f2ab6d372131f780cc4d93e22
-
SHA256
aeb935a0eed839b1670d762dba8c2ccf443340d4344178070c74be2e666e8e0c
-
SHA512
4c037c2a699a2349d092686ac18697278d4a52c01752234f4fd3ea2578f8f321557ecd40616ce060fd0ae24411dca9de1f01794cd44a860ed889cbdaf05e2cbe
-
SSDEEP
1536:n5+ZIZ0yIelWO+4ZbjClLVUwNNyO3wQZS:n5+Z9yIIWOhZbjyUQMOAaS
Behavioral task
behavioral1
Sample
Roblox cheat.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Roblox cheat.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.1
147.185.221.23:53631
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Roblox cheat.exe
-
Size
71KB
-
MD5
f24d23861ae25a5e29ed07ce2edf23ae
-
SHA1
f44fb5843e43b04f2ab6d372131f780cc4d93e22
-
SHA256
aeb935a0eed839b1670d762dba8c2ccf443340d4344178070c74be2e666e8e0c
-
SHA512
4c037c2a699a2349d092686ac18697278d4a52c01752234f4fd3ea2578f8f321557ecd40616ce060fd0ae24411dca9de1f01794cd44a860ed889cbdaf05e2cbe
-
SSDEEP
1536:n5+ZIZ0yIelWO+4ZbjClLVUwNNyO3wQZS:n5+Z9yIIWOhZbjyUQMOAaS
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1