General
-
Target
XWorm 5.6 Cracked.zip
-
Size
24.2MB
-
Sample
241113-xax3nswpgx
-
MD5
353c221103efd60bd38f1625a21c80d7
-
SHA1
414e3eb44d636a628b455a4d8b2997cb06564f14
-
SHA256
e0be40f12d3b6dfee674688d514287be2dbedbd114ec37356b610e25996ac9a4
-
SHA512
2d94d46d43afaa43b7515f06455525008601c77cdf5663e3f28220917d2c8b7a9ca0423a521edac56fb51e45dd6264168db101018ed4e83ccc0d46a123cdd7f1
-
SSDEEP
393216:wyazqFXFeuBc9Q+FpI3zDuG9YCMeg7kjuABAKbybbF6s5eNYJkY29QEH4k:wyVFXDBYQw23fkkjGKOj5eXPQEYk
Behavioral task
behavioral1
Sample
XWorm 5.6 Cracked.zip
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
I5KjeGkFrAlxFhNu
-
install_file
USB.exe
Targets
-
-
Target
XWorm 5.6 Cracked.zip
-
Size
24.2MB
-
MD5
353c221103efd60bd38f1625a21c80d7
-
SHA1
414e3eb44d636a628b455a4d8b2997cb06564f14
-
SHA256
e0be40f12d3b6dfee674688d514287be2dbedbd114ec37356b610e25996ac9a4
-
SHA512
2d94d46d43afaa43b7515f06455525008601c77cdf5663e3f28220917d2c8b7a9ca0423a521edac56fb51e45dd6264168db101018ed4e83ccc0d46a123cdd7f1
-
SSDEEP
393216:wyazqFXFeuBc9Q+FpI3zDuG9YCMeg7kjuABAKbybbF6s5eNYJkY29QEH4k:wyVFXDBYQw23fkkjGKOj5eXPQEYk
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-