General
-
Target
downloader.exe
-
Size
30.1MB
-
Sample
241117-1rwgystngn
-
MD5
ce51ab4fa2a58a2fa1548f8b5fa4bc83
-
SHA1
8d89a3fc9a1e4f03e73a1d4509a2ae5e567d6ba3
-
SHA256
94ee5da3dcb01b3f75d0d974d18710293d02806e900cbad3b3401c79b9bf6263
-
SHA512
c67652273485d72fde8d0659956429386ececbd17a464ebcd8b01e374a5de83f368483982365242ad77d28fb7a66b709b98aea70834a8613e9bb54debc0b2d16
-
SSDEEP
393216:R8oimu7izBxR3QRzhzvQ99Sq8lu0q5tDJKoWSxJGBL7asmo+AJCcLKA4:R9w9wD5xUesbJCcg
Static task
static1
Behavioral task
behavioral1
Sample
downloader.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
83.38.24.1:1603
-
Install_directory
%Userprofile%
-
install_file
USB.exe
Targets
-
-
Target
downloader.exe
-
Size
30.1MB
-
MD5
ce51ab4fa2a58a2fa1548f8b5fa4bc83
-
SHA1
8d89a3fc9a1e4f03e73a1d4509a2ae5e567d6ba3
-
SHA256
94ee5da3dcb01b3f75d0d974d18710293d02806e900cbad3b3401c79b9bf6263
-
SHA512
c67652273485d72fde8d0659956429386ececbd17a464ebcd8b01e374a5de83f368483982365242ad77d28fb7a66b709b98aea70834a8613e9bb54debc0b2d16
-
SSDEEP
393216:R8oimu7izBxR3QRzhzvQ99Sq8lu0q5tDJKoWSxJGBL7asmo+AJCcLKA4:R9w9wD5xUesbJCcg
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-