General
-
Target
TRXLoader.exe
-
Size
44.0MB
-
Sample
241111-n6jqgsyfrq
-
MD5
a4b651742b17fcb894107862b5587344
-
SHA1
9fb0be5290ff4cb8a7e7a41656beb950f7718f8d
-
SHA256
3f862630ab1f165e33bdf388a4829a0274abd88ee783273f03353857c21aa9a0
-
SHA512
ba19d8bc1aa69553f1ea1ab3937e226b4664be81fa77371d093a52f23a9806e7f7e9f3f11dbec805b7ed943cb571984774c5591dbedf816c7ff05aaf7da062b3
-
SSDEEP
1536:j3eHtRfrimdNmkKZr311OGAiQj39IdcCqcAPt9TeKd+k:KHtRp6r311RAzj390VAPt9P+k
Static task
static1
Behavioral task
behavioral1
Sample
TRXLoader.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:38492
warning-ms.gl.at.ply.gg:38492
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
TRXLoader.exe
-
Size
44.0MB
-
MD5
a4b651742b17fcb894107862b5587344
-
SHA1
9fb0be5290ff4cb8a7e7a41656beb950f7718f8d
-
SHA256
3f862630ab1f165e33bdf388a4829a0274abd88ee783273f03353857c21aa9a0
-
SHA512
ba19d8bc1aa69553f1ea1ab3937e226b4664be81fa77371d093a52f23a9806e7f7e9f3f11dbec805b7ed943cb571984774c5591dbedf816c7ff05aaf7da062b3
-
SSDEEP
1536:j3eHtRfrimdNmkKZr311OGAiQj39IdcCqcAPt9TeKd+k:KHtRp6r311RAzj390VAPt9P+k
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-