General
-
Target
8f9e0d533fa5774f0653db9f900b4ef4356d8b3f1f8a90ae5f57bab24f14d86e.exe
-
Size
275KB
-
Sample
241115-c84b5axfkn
-
MD5
bac631aa713e238ca4cc65b620736715
-
SHA1
d0f7bcda4d2fdcf3e1f41859e5251d021603f909
-
SHA256
8f9e0d533fa5774f0653db9f900b4ef4356d8b3f1f8a90ae5f57bab24f14d86e
-
SHA512
731cc3e56c4b48b278c512712068c815fcd989ed5250c2443c3e38d36eac8e40d969d9b84dfbd1e28fe80c555255006440ec24aa904c63e2d31a086a8bfb11d3
-
SSDEEP
3072:RdOB4dT+b7chk6qvFORJgmXbcK0L4AFD/l8xZ4uIxPLKKx03fJqWkG1SpPlpQJQU:RdOCob7oOEbGCIEfWcSlaUM/g
Behavioral task
behavioral1
Sample
8f9e0d533fa5774f0653db9f900b4ef4356d8b3f1f8a90ae5f57bab24f14d86e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8f9e0d533fa5774f0653db9f900b4ef4356d8b3f1f8a90ae5f57bab24f14d86e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:57577
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
8f9e0d533fa5774f0653db9f900b4ef4356d8b3f1f8a90ae5f57bab24f14d86e.exe
-
Size
275KB
-
MD5
bac631aa713e238ca4cc65b620736715
-
SHA1
d0f7bcda4d2fdcf3e1f41859e5251d021603f909
-
SHA256
8f9e0d533fa5774f0653db9f900b4ef4356d8b3f1f8a90ae5f57bab24f14d86e
-
SHA512
731cc3e56c4b48b278c512712068c815fcd989ed5250c2443c3e38d36eac8e40d969d9b84dfbd1e28fe80c555255006440ec24aa904c63e2d31a086a8bfb11d3
-
SSDEEP
3072:RdOB4dT+b7chk6qvFORJgmXbcK0L4AFD/l8xZ4uIxPLKKx03fJqWkG1SpPlpQJQU:RdOCob7oOEbGCIEfWcSlaUM/g
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-