General
-
Target
skeetCRACK.rar
-
Size
48KB
-
Sample
241111-gel8zaxnbp
-
MD5
87c5c8d41987fc8bda4cd1c0347c63b8
-
SHA1
7ce323c24f55ae24ebdc7253baf46775c9a6fd05
-
SHA256
e3857938e984ebf091b7f9906513af059c2fa13fc6dc51a1d30858c7d5fde1e7
-
SHA512
571ede528686b6cc5f0843704f31ba7de28786a7d7751b2281d32dd8f22f62f2d32fe8443505129fa37c42e3e4c2f0841f09e003e0fef15aa093463cef49ac0e
-
SSDEEP
768:n2mvZbIAkBVUCe8bmlovSfNXtha5CQO/poSQacJoGhWDeaiXRggvZ18QqKXplI:2acZV7vvSfThDRfQ9yG4GXymDqWY
Static task
static1
Malware Config
Extracted
xworm
council-field.gl.at.ply.gg:50139
-
Install_directory
%AppData%
-
install_file
svhost.exe
Targets
-
-
Target
skeetCRACK.rar
-
Size
48KB
-
MD5
87c5c8d41987fc8bda4cd1c0347c63b8
-
SHA1
7ce323c24f55ae24ebdc7253baf46775c9a6fd05
-
SHA256
e3857938e984ebf091b7f9906513af059c2fa13fc6dc51a1d30858c7d5fde1e7
-
SHA512
571ede528686b6cc5f0843704f31ba7de28786a7d7751b2281d32dd8f22f62f2d32fe8443505129fa37c42e3e4c2f0841f09e003e0fef15aa093463cef49ac0e
-
SSDEEP
768:n2mvZbIAkBVUCe8bmlovSfNXtha5CQO/poSQacJoGhWDeaiXRggvZ18QqKXplI:2acZV7vvSfThDRfQ9yG4GXymDqWY
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-