General
-
Target
edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386.zip
-
Size
426KB
-
Sample
241114-rh8lgszhlh
-
MD5
7c513924abf01cd80b3d099c4acbff09
-
SHA1
3828221afef8742a56e81522dbeec77d8df885be
-
SHA256
7cad3e5d2d0e3da754ed20cd1998e9c0de71b0c414cd55d301924105454c8f86
-
SHA512
feac6d11545e1442a99709c556214c4ef58fe3ce826b466f0a4a0b6f476017dbdc45f145bd601ba6baad47d5286d87cb19e95097498c96bb42e7df1a2c4e6898
-
SSDEEP
12288:TbK1yTUv9M7+cpRVbOVcqRPYsGs/k88ddtyuj9eWUR:TMyI1M7F5OmqappTtuWm
Static task
static1
Behavioral task
behavioral1
Sample
edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
pkaraven.duckdns.org:9387
PN8dWiUH0oIhIHhD
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386.exe
-
Size
528KB
-
MD5
046dc61545c4ca911c25cfc844b3b00c
-
SHA1
671cda72944c3920edb83520eb5d2317af0c60cb
-
SHA256
edb8cc2548ed59dc491c0a1cb0b4907a2235b13bbe06a880053bbab544f91386
-
SHA512
c8024a51ede593157cc7a881a8587536cf010c4c8f9838e44518371dbcec12e96fcac16742617eec414f6a280a5abbcf8d9fe3bcac9c04b75049006f2d93af6e
-
SSDEEP
12288:5hU2ft8hWSxwvzeA5ScGZshgwnmnmalFYCJVM:bHfuWSxWRGgLmnmaQCJV
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-