General
-
Target
30a5ad6d62e4cd603673a9e3b3e77631.bin
-
Size
927KB
-
Sample
241117-bgy3naxgrp
-
MD5
ba1ab9e652ae2f3b2f072ae49e9b8dcd
-
SHA1
cd493668b314fb53614addc4340fe7758425a967
-
SHA256
bcd0ac1f3df9c064c81fdae2cdd838ab757144ec0737ea494bc9b705b09c0de5
-
SHA512
9c7ec3a15efe05d3d3539b6f3439efe41858af20dd1e23eb7e5ac851591dcc92d74a5a47483ef2312629d45963b66f666268f95ba4b9ef89ddfe9a13fd94fa64
-
SSDEEP
24576:5dMN8SUdml1/xTGzWP1KEzuprO8PUdvxHUKs:TMNKcnZG+v27UdqP
Static task
static1
Behavioral task
behavioral1
Sample
fda3ed77e29ab105a5c1762c84c6fae92b4497c5954cb305e613cfe030506090.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
147.185.221.23:25808
-
Install_directory
%LocalAppData%
-
install_file
Realtek HD Audio Universal Service.exe
Extracted
xworm
5.0
senior-adopted.gl.at.ply.gg:56758
Bz7AHGcWuERgvPvx
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
fda3ed77e29ab105a5c1762c84c6fae92b4497c5954cb305e613cfe030506090.exe
-
Size
1.1MB
-
MD5
30a5ad6d62e4cd603673a9e3b3e77631
-
SHA1
c8d42f3efe983add08b190325239290e4fb79631
-
SHA256
fda3ed77e29ab105a5c1762c84c6fae92b4497c5954cb305e613cfe030506090
-
SHA512
a0a87ea2374a4d3f8dd014011a0373f6302aa04d8dc70e9bda0e78221486057ac26ef09c3702e6ee80a3f738bcee7c8fb62363b5cd238ed36b9fb068d35113bc
-
SSDEEP
24576:0zAW5Wy3XuH/pR0+9vwe5oc78dBDaiMo9mRCYDwECvw:0NWHH/Dt55l4jaYKIEcw
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-