General
-
Target
exe030.exe
-
Size
1.1MB
-
Sample
241113-27h28szqcw
-
MD5
30a5ad6d62e4cd603673a9e3b3e77631
-
SHA1
c8d42f3efe983add08b190325239290e4fb79631
-
SHA256
fda3ed77e29ab105a5c1762c84c6fae92b4497c5954cb305e613cfe030506090
-
SHA512
a0a87ea2374a4d3f8dd014011a0373f6302aa04d8dc70e9bda0e78221486057ac26ef09c3702e6ee80a3f738bcee7c8fb62363b5cd238ed36b9fb068d35113bc
-
SSDEEP
24576:0zAW5Wy3XuH/pR0+9vwe5oc78dBDaiMo9mRCYDwECvw:0NWHH/Dt55l4jaYKIEcw
Static task
static1
Behavioral task
behavioral1
Sample
exe030.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
147.185.221.23:25808
-
Install_directory
%LocalAppData%
-
install_file
Realtek HD Audio Universal Service.exe
Extracted
xworm
5.0
senior-adopted.gl.at.ply.gg:56758
Bz7AHGcWuERgvPvx
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
exe030.exe
-
Size
1.1MB
-
MD5
30a5ad6d62e4cd603673a9e3b3e77631
-
SHA1
c8d42f3efe983add08b190325239290e4fb79631
-
SHA256
fda3ed77e29ab105a5c1762c84c6fae92b4497c5954cb305e613cfe030506090
-
SHA512
a0a87ea2374a4d3f8dd014011a0373f6302aa04d8dc70e9bda0e78221486057ac26ef09c3702e6ee80a3f738bcee7c8fb62363b5cd238ed36b9fb068d35113bc
-
SSDEEP
24576:0zAW5Wy3XuH/pR0+9vwe5oc78dBDaiMo9mRCYDwECvw:0NWHH/Dt55l4jaYKIEcw
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-