General
-
Target
NLHybrid Fixer.exe
-
Size
42KB
-
Sample
241112-gz6s4szlcj
-
MD5
269085c7755574a5cd840b298a0b4a55
-
SHA1
3b20a9f3c0e5ed34d37c5c915c07fd93da7d7cbd
-
SHA256
ee94f31406ba029502b3737f9d2c2d2d22448643deaa3095239a55b58b9169c8
-
SHA512
47b5782e53cf03bb5eb8f96584b9e0608bc10038b8721761bf67af75ed0b77a2e51ef94a9d62302e6e0d45885e72d47b80815caa8c063a616d50b646885b5f65
-
SSDEEP
768:yvD19vXwj/0OhWgEiymT+jxPuqF3t9NRX6POChM0LevH:I19/wj/F8iy/P5F99NRX6POCK0k
Behavioral task
behavioral1
Sample
NLHybrid Fixer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
NLHybrid Fixer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
remote-newest.gl.at.ply.gg:62113
fund-scared.gl.at.ply.gg:62113
UrM5eoX12ULh6st6
-
Install_directory
%Userprofile%
-
install_file
win64updater.exe
Targets
-
-
Target
NLHybrid Fixer.exe
-
Size
42KB
-
MD5
269085c7755574a5cd840b298a0b4a55
-
SHA1
3b20a9f3c0e5ed34d37c5c915c07fd93da7d7cbd
-
SHA256
ee94f31406ba029502b3737f9d2c2d2d22448643deaa3095239a55b58b9169c8
-
SHA512
47b5782e53cf03bb5eb8f96584b9e0608bc10038b8721761bf67af75ed0b77a2e51ef94a9d62302e6e0d45885e72d47b80815caa8c063a616d50b646885b5f65
-
SSDEEP
768:yvD19vXwj/0OhWgEiymT+jxPuqF3t9NRX6POChM0LevH:I19/wj/F8iy/P5F99NRX6POCK0k
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1