General
-
Target
Realtek HD Audio Universal Service.exe
-
Size
40KB
-
Sample
241113-rcljrswpfq
-
MD5
876020bf5050a2b498b45cb65d89f067
-
SHA1
7f7ace329e3c77e14fc5bb11d1797e5f61f96859
-
SHA256
9e2cc1e98ba3672218c8fbdeb5c8831c340a25c4b425ee32bf45527577c8eb2c
-
SHA512
f168fe3bb22c1947036418737845c9200c5642fec69d24a982d47d2c0da9502e8e8e86268fae5c39f28ab8267fc4cb2644a9e27a4f8b898dfafd4c5b801fd7c0
-
SSDEEP
768:MBj78fx6MooenBjJfDUbtRFH9OKl6BOMhXL05jh:o78p6MLeBjJfIbDFH93l6BOMFkjh
Behavioral task
behavioral1
Sample
Realtek HD Audio Universal Service.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
147.185.221.23:57069
lW9cEvIRnaJBDeUt
-
Install_directory
%LocalAppData%
-
install_file
Realtek HD Audio Universal Service.exe
Targets
-
-
Target
Realtek HD Audio Universal Service.exe
-
Size
40KB
-
MD5
876020bf5050a2b498b45cb65d89f067
-
SHA1
7f7ace329e3c77e14fc5bb11d1797e5f61f96859
-
SHA256
9e2cc1e98ba3672218c8fbdeb5c8831c340a25c4b425ee32bf45527577c8eb2c
-
SHA512
f168fe3bb22c1947036418737845c9200c5642fec69d24a982d47d2c0da9502e8e8e86268fae5c39f28ab8267fc4cb2644a9e27a4f8b898dfafd4c5b801fd7c0
-
SSDEEP
768:MBj78fx6MooenBjJfDUbtRFH9OKl6BOMhXL05jh:o78p6MLeBjJfIbDFH93l6BOMFkjh
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-