General
-
Target
6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66.exe
-
Size
34KB
-
Sample
241112-dcwsvatbnn
-
MD5
121602c80204ce250c2bb4ba098c6e9c
-
SHA1
e5547e67e3a0efd7611590785143443a23ec9c0c
-
SHA256
6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66
-
SHA512
c96f8738b4e4ff1a3b2f83d77689d0d4429e26c44b5d64124fbea458d087704f28dc1960c45825a36f1c54c2ce997657d738d8be653f81c8e8d7cddd41588b09
-
SSDEEP
768:AYBpz/QvWZqvoXu24OFrCxxF39XTp6LOjh/bUJ:AYBpz/QvwtbFGrF39XV6LOjN4J
Behavioral task
behavioral1
Sample
6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:26848
on-modules.gl.at.ply.gg:26848
wrmsNSNXixl9dMEG
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66.exe
-
Size
34KB
-
MD5
121602c80204ce250c2bb4ba098c6e9c
-
SHA1
e5547e67e3a0efd7611590785143443a23ec9c0c
-
SHA256
6d2e418121082257cd6ea8ea7adacae1723003d03bde9ea3c0c396e033892f66
-
SHA512
c96f8738b4e4ff1a3b2f83d77689d0d4429e26c44b5d64124fbea458d087704f28dc1960c45825a36f1c54c2ce997657d738d8be653f81c8e8d7cddd41588b09
-
SSDEEP
768:AYBpz/QvWZqvoXu24OFrCxxF39XTp6LOjh/bUJ:AYBpz/QvwtbFGrF39XV6LOjN4J
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-