General
-
Target
JJsploit.exe
-
Size
328KB
-
Sample
241112-wkhv3axhqr
-
MD5
7c85044f93d8185748d4519a3fa7a99c
-
SHA1
760353df28933f8c60f44dbc1f5592e47f5be99e
-
SHA256
6c38b37ea2e05082f0357c42d3e216d50ba4a50aaad9ca7a00a85402896e5f58
-
SHA512
d522d394751709904e7f44c5dfbef04814e6dc9bf0bb57716ca0058f6787c66d7be74e37c1232ac7fb165ca4e0a11861ca220cc0fef9903d411722fba19e5697
-
SSDEEP
3072:MrsAo+b1lo43OLx4RzsGmizgqDwyRFatcZqivp:Mrbbno48SaGRvDBTatcZv
Behavioral task
behavioral1
Sample
JJsploit.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
JJsploit.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:54625
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
JJsploit.exe
-
Size
328KB
-
MD5
7c85044f93d8185748d4519a3fa7a99c
-
SHA1
760353df28933f8c60f44dbc1f5592e47f5be99e
-
SHA256
6c38b37ea2e05082f0357c42d3e216d50ba4a50aaad9ca7a00a85402896e5f58
-
SHA512
d522d394751709904e7f44c5dfbef04814e6dc9bf0bb57716ca0058f6787c66d7be74e37c1232ac7fb165ca4e0a11861ca220cc0fef9903d411722fba19e5697
-
SSDEEP
3072:MrsAo+b1lo43OLx4RzsGmizgqDwyRFatcZqivp:Mrbbno48SaGRvDBTatcZv
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1