General
-
Target
61c9156d480363777ae7bed66561486ab4e7d97c5fca890ece91ea5004636150N.exe
-
Size
193KB
-
Sample
241116-ajcrrswckj
-
MD5
6cad6576780e786ee72a659d50dc4020
-
SHA1
50cb376363e6317836c3cd774b135531bc6110c0
-
SHA256
61c9156d480363777ae7bed66561486ab4e7d97c5fca890ece91ea5004636150
-
SHA512
20724d675c27f11c1496257afa6b3c8304d87a642acaa7cdb9b368d1a76b041afa3f05a09857a835f8124b832ebca10f81c22399abf03cb9af1a925eb62a3ae7
-
SSDEEP
6144:g2JhWiZqebUcSxw1RrPDhcZhyL8vr/5FZRAdPOl/AT7tu9:DhvSxCJbeZQ8vNFZAPOST7t
Static task
static1
Behavioral task
behavioral1
Sample
61c9156d480363777ae7bed66561486ab4e7d97c5fca890ece91ea5004636150N.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
wego666.webredirect.org:666
0MJ5uaqdM5KfHEtd
-
install_file
USB.exe
Targets
-
-
Target
61c9156d480363777ae7bed66561486ab4e7d97c5fca890ece91ea5004636150N.exe
-
Size
193KB
-
MD5
6cad6576780e786ee72a659d50dc4020
-
SHA1
50cb376363e6317836c3cd774b135531bc6110c0
-
SHA256
61c9156d480363777ae7bed66561486ab4e7d97c5fca890ece91ea5004636150
-
SHA512
20724d675c27f11c1496257afa6b3c8304d87a642acaa7cdb9b368d1a76b041afa3f05a09857a835f8124b832ebca10f81c22399abf03cb9af1a925eb62a3ae7
-
SSDEEP
6144:g2JhWiZqebUcSxw1RrPDhcZhyL8vr/5FZRAdPOl/AT7tu9:DhvSxCJbeZQ8vNFZAPOST7t
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-