General
-
Target
winlocker.exe
-
Size
39.5MB
-
Sample
241117-gb719s1rdt
-
MD5
cd4d337ac30d004b93a6ae176704cf24
-
SHA1
3f5f240bc6a49b81ea948f3989fe12c373b31ff9
-
SHA256
f1fceedb23db0880361aa4c981efb49fa5bd361bec10741d3821e53752cd6588
-
SHA512
4b7be85b352a10993de06f19fe0bc954265a3476a12482b06a000c840095650b79108278b4fb04cc6818abe29c14c00df96d3f4f0af6b2135d9c65d180f7db88
-
SSDEEP
786432:3+gX4BMdhwzTQXR5FbPp6FcSS5U/LT2KzVyPVLBd5gPQYErOcvIy3:ZXGMK4XR3bLSCU/+6yPl358PE9Iy3
Malware Config
Extracted
xworm
while-stuffed.gl.at.ply.gg:61275
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Targets
-
-
Target
winlocker.exe
-
Size
39.5MB
-
MD5
cd4d337ac30d004b93a6ae176704cf24
-
SHA1
3f5f240bc6a49b81ea948f3989fe12c373b31ff9
-
SHA256
f1fceedb23db0880361aa4c981efb49fa5bd361bec10741d3821e53752cd6588
-
SHA512
4b7be85b352a10993de06f19fe0bc954265a3476a12482b06a000c840095650b79108278b4fb04cc6818abe29c14c00df96d3f4f0af6b2135d9c65d180f7db88
-
SSDEEP
786432:3+gX4BMdhwzTQXR5FbPp6FcSS5U/LT2KzVyPVLBd5gPQYErOcvIy3:ZXGMK4XR3bLSCU/+6yPl358PE9Iy3
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1