General
-
Target
Output.exe
-
Size
3.3MB
-
Sample
241113-ysp1fsxpfv
-
MD5
631c497597c5c12304d528b24ccc31df
-
SHA1
9da881cd6797e4e8646de4df60eea73ae45c3133
-
SHA256
239584ed2b45abd89565c75968a8ca7d0624b2df851463f80a485e1efc04d9e4
-
SHA512
35a6bb13ff373aebb2a6fc080ea0f69e968fbef3441ce7f69604e5f97645ae9e6feb95bad1058fa58f8e652dcc2befd6464d9f62d707d8115c743c57a912957e
-
SSDEEP
98304:gm7q1K/hJp6SjJjtPzGhHzKIfx+ceJpTYZ:x7q1Irp9jltPahVfx+ceJtYZ
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
testarosa.duckdns.org:7119
Ljk1RFh4f0rbZvhE
-
Install_directory
%Temp%
-
install_file
Realtec.exe
Extracted
xworm
147.185.221.23:25808
-
Install_directory
%LocalAppData%
-
install_file
Realtek HD Audio Universal Service.exe
Targets
-
-
Target
Output.exe
-
Size
3.3MB
-
MD5
631c497597c5c12304d528b24ccc31df
-
SHA1
9da881cd6797e4e8646de4df60eea73ae45c3133
-
SHA256
239584ed2b45abd89565c75968a8ca7d0624b2df851463f80a485e1efc04d9e4
-
SHA512
35a6bb13ff373aebb2a6fc080ea0f69e968fbef3441ce7f69604e5f97645ae9e6feb95bad1058fa58f8e652dcc2befd6464d9f62d707d8115c743c57a912957e
-
SSDEEP
98304:gm7q1K/hJp6SjJjtPzGhHzKIfx+ceJpTYZ:x7q1Irp9jltPahVfx+ceJtYZ
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1