General
-
Target
CrossHairX.exe
-
Size
39KB
-
Sample
241112-vg29vsxckf
-
MD5
080026dbcae03f2bfea9bee4ac687fe7
-
SHA1
3f16542806354dad25c5bae3fd9e2bc7d7e3d36b
-
SHA256
054f80d76dacb9d1165f12a3052990cfcad73ec63ba4fb5305ced170e43e56f4
-
SHA512
2fefcfc6191b74f28393db4da5a797a362688ff07d0bfce31bc4a0b24ff83d99fe84520bdf3300529241a68c765d9026816bbc93e69bcde479c0a6a5b1738ffd
-
SSDEEP
768:2jwkGJWkrdf8bpJ6eaWaNmUTHnFPp9nCw6pO9huu5G:2jrGJWHKeAQ+HFx9nCw6pO94p
Behavioral task
behavioral1
Sample
CrossHairX.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
CrossHairX.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
hosting-doe.gl.at.ply.gg:20006
4ZfxXQlNchTSkPtE
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
CrossHairX.exe
-
Size
39KB
-
MD5
080026dbcae03f2bfea9bee4ac687fe7
-
SHA1
3f16542806354dad25c5bae3fd9e2bc7d7e3d36b
-
SHA256
054f80d76dacb9d1165f12a3052990cfcad73ec63ba4fb5305ced170e43e56f4
-
SHA512
2fefcfc6191b74f28393db4da5a797a362688ff07d0bfce31bc4a0b24ff83d99fe84520bdf3300529241a68c765d9026816bbc93e69bcde479c0a6a5b1738ffd
-
SSDEEP
768:2jwkGJWkrdf8bpJ6eaWaNmUTHnFPp9nCw6pO9huu5G:2jrGJWHKeAQ+HFx9nCw6pO94p
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-