General
-
Target
Nursultan (2).rar
-
Size
64KB
-
Sample
241115-rbwckstrbz
-
MD5
72f19f9be2548860b74de35487064b00
-
SHA1
85e66d39df26444e7f412c4d13d347e809e15fae
-
SHA256
d4d38f87de58a5245ab1a01a7e28df51f69e890ab05ebc67ede60bf59221c721
-
SHA512
976cc5389224186d3fe83a754d9ae3e22afba97757a2711587bf578703e22b0524e4187698e0dd4d7e4f2affeebff3ab83164a3cebfc259a249e4d56fa03e058
-
SSDEEP
1536:JTDcIp/Ib1bTxV36QPwGKFHR9fZ8CGUQnEqLeEYx0Gttcttttttttttttttttttt:JncIpgtmKwd/fBGUq00Gttcttttttttl
Static task
static1
Behavioral task
behavioral1
Sample
Nursultan/Nurik.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nursultan/Nurik.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:38492
warning-ms.gl.at.ply.gg:38492
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
Nursultan/Nurik.exe
-
Size
93.0MB
-
MD5
a7af4ea5482967126191e729140dfd4c
-
SHA1
dbff744bbc2f7adfbe337f3fd700c50433301b2d
-
SHA256
5cac4982836ceae3b8de591f5f469234c5e75dd5c90757279015ddd6b73251d6
-
SHA512
4734bde77c6fe490589aeb7ac142fa293b59b09cda0226bc22b2c8928c2d4cd1ef47cab95d88a7618c9dd76fe482a346bd6dd2186dea7610e5697c3b46c32156
-
SSDEEP
1536:OfeHtRfrimdNmkKZr311OGAiQj39IdcCqcAPh9KE:nHtRp6r311RAzj390VAPh9v
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-