General
-
Target
52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6
-
Size
76KB
-
Sample
241113-12yp3a1akr
-
MD5
ecb15e11ca93f8beac14543492407f4f
-
SHA1
a47d421585ec1da07d32e0d8101829fcbd300bc1
-
SHA256
52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6
-
SHA512
59f3dee42563a4f41e24dfff6c51df55f73610b16065cb35734a798c2942a5c06e6c161ad9063e800d917401939313709113ad1326cb7f669a99e7e7cd9f027f
-
SSDEEP
1536:Sx3GsLjPnIjCxAVqGePY06MJebCqfnQ2oA9FKg+6HOqMed69:2DnBA6PEMJebCMnK+FZONl9
Behavioral task
behavioral1
Sample
52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
realark.net:5235
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6
-
Size
76KB
-
MD5
ecb15e11ca93f8beac14543492407f4f
-
SHA1
a47d421585ec1da07d32e0d8101829fcbd300bc1
-
SHA256
52d778b6b7e3115d0746bd1aef233cb7d97c8a2f018de80cd37bfefc0388a4c6
-
SHA512
59f3dee42563a4f41e24dfff6c51df55f73610b16065cb35734a798c2942a5c06e6c161ad9063e800d917401939313709113ad1326cb7f669a99e7e7cd9f027f
-
SSDEEP
1536:Sx3GsLjPnIjCxAVqGePY06MJebCqfnQ2oA9FKg+6HOqMed69:2DnBA6PEMJebCMnK+FZONl9
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1