General
-
Target
sample.zip
-
Size
302KB
-
Sample
241116-xjgr2s1hrq
-
MD5
9e8a086ef12dda4f5e4bca642526fce6
-
SHA1
60ee913f968da1db1274cd51a3438523123232f4
-
SHA256
90a5459c95036aace6e45f9357ad5577ba1265a5a18cbe8e1094726b5299fae5
-
SHA512
83bbd190667aae5c9a2c01087457ae63227dff3ada7e459223198f95d68ff85b499ee3668c87380ff16d866d8e4d0e30d7105bffec0f368c3a46db74c07e01cb
-
SSDEEP
6144:tMqXFIbKXyoc5NwK9RscAVGwNvb/Trn6yj14y0nj7IUto8u9iEOv7J1B47m7oQ7:i0FZcfweRscbwN7TrnV1Ij7f1YiEOVLL
Static task
static1
Behavioral task
behavioral1
Sample
sample.zip
Resource
win7-20240903-en
Malware Config
Extracted
xworm
https://pastebin.com/raw/L3Xphr0J:201770
-
install_file
Prefetch Manager.exe
-
pastebin_url
https://pastebin.com/raw/L3Xphr0J
Targets
-
-
Target
sample.zip
-
Size
302KB
-
MD5
9e8a086ef12dda4f5e4bca642526fce6
-
SHA1
60ee913f968da1db1274cd51a3438523123232f4
-
SHA256
90a5459c95036aace6e45f9357ad5577ba1265a5a18cbe8e1094726b5299fae5
-
SHA512
83bbd190667aae5c9a2c01087457ae63227dff3ada7e459223198f95d68ff85b499ee3668c87380ff16d866d8e4d0e30d7105bffec0f368c3a46db74c07e01cb
-
SSDEEP
6144:tMqXFIbKXyoc5NwK9RscAVGwNvb/Trn6yj14y0nj7IUto8u9iEOv7J1B47m7oQ7:i0FZcfweRscbwN7TrnV1Ij7f1YiEOVLL
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-