General
-
Target
82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008N.exe
-
Size
56KB
-
Sample
241117-1s85fayhld
-
MD5
fae36591a84f55e92cb352a4324cb180
-
SHA1
64206e9b6e16e2e55db3e66f19024d31d87a0ad9
-
SHA256
82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008
-
SHA512
520da9816801b36e5cefce3e64fd2ee8f34483a5298d60584224b3371f0b473d5402c19889067d2188aaf3db4b4382936b96509ab0eb34c7669676cae2c12f4f
-
SSDEEP
1536:ASFTU9xZVqGdtCfBXdi99iQTkbb4IJlqRp2OHLQ:ASFTUNVq04fBti91Tkbb8Rp2OHLQ
Behavioral task
behavioral1
Sample
82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
Cactus-33152.portmap.host:33152
-
Install_directory
%AppData%
-
install_file
Teams.exe
Targets
-
-
Target
82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008N.exe
-
Size
56KB
-
MD5
fae36591a84f55e92cb352a4324cb180
-
SHA1
64206e9b6e16e2e55db3e66f19024d31d87a0ad9
-
SHA256
82549e9e27a539e6bfd29c015682f93c7aac81f35035146dd64312783e7a8008
-
SHA512
520da9816801b36e5cefce3e64fd2ee8f34483a5298d60584224b3371f0b473d5402c19889067d2188aaf3db4b4382936b96509ab0eb34c7669676cae2c12f4f
-
SSDEEP
1536:ASFTU9xZVqGdtCfBXdi99iQTkbb4IJlqRp2OHLQ:ASFTUNVq04fBti91Tkbb8Rp2OHLQ
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1