General
-
Target
3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5N
-
Size
114KB
-
Sample
241111-v1pswawjcn
-
MD5
e20b663922380d2a79b01883ba62e890
-
SHA1
dd1a149b68a295548c0de33122efe0b04a202fd6
-
SHA256
3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5
-
SHA512
187a06c21aa6f532ef6e1a46141d95a1aded62b3b9908789c85b57038e07357e64a92642f7ff25e7ea27bb00ab75f1756f8b68d1eb094cdbbe8f6f8b721bcac5
-
SSDEEP
1536:JjYYfOtuaA3+pfbrp+ZY9QQK676lJOqVChiH0hLP+VVVVVVVVVVVVVVVVVVVVVVf:B0uaA3+pfbrpfOZfOqVbH0hLN0
Behavioral task
behavioral1
Sample
3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5N.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:10967
22.ip.gl.ply.gg:10967
-
Install_directory
%Userprofile%
-
install_file
dllhso.exe
Targets
-
-
Target
3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5N
-
Size
114KB
-
MD5
e20b663922380d2a79b01883ba62e890
-
SHA1
dd1a149b68a295548c0de33122efe0b04a202fd6
-
SHA256
3d25fe2989b3b9505c5b45751d1da232fe3715bff54c6900d82b99e7ad76e6c5
-
SHA512
187a06c21aa6f532ef6e1a46141d95a1aded62b3b9908789c85b57038e07357e64a92642f7ff25e7ea27bb00ab75f1756f8b68d1eb094cdbbe8f6f8b721bcac5
-
SSDEEP
1536:JjYYfOtuaA3+pfbrp+ZY9QQK676lJOqVChiH0hLP+VVVVVVVVVVVVVVVVVVVVVVf:B0uaA3+pfbrpfOZfOqVbH0hLN0
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-