General
-
Target
Api-AutoUpdater-Click-yes.exe
-
Size
205KB
-
Sample
241117-hqgy3atgkb
-
MD5
d56646c8251432a184a2154302512e29
-
SHA1
acfa04f7245e24eac7f452fb576ccc606655418f
-
SHA256
fc61030b2b9431b0bb5f1a39e4d2a225fd737f143a7f7bf552aaed1ea9a8549e
-
SHA512
566a51751e6bdc67fb06d4bce8ce2141298475e34b6fdcdba42de2ca74eb02c19b10962707eb6bb96cc6f7ce202130b3d16a64b4feb4578a6cfaa322fefb57db
-
SSDEEP
6144:7SncRl9Fb3g/7CbCR5F5I5eJAdbyVTqkbtP:e4LZg/OoFS5Fbw
Malware Config
Extracted
xworm
job-moore.gl.at.ply.gg:49404
-
Install_directory
%ProgramData%
-
install_file
Helper.exe
Targets
-
-
Target
Api-AutoUpdater-Click-yes.exe
-
Size
205KB
-
MD5
d56646c8251432a184a2154302512e29
-
SHA1
acfa04f7245e24eac7f452fb576ccc606655418f
-
SHA256
fc61030b2b9431b0bb5f1a39e4d2a225fd737f143a7f7bf552aaed1ea9a8549e
-
SHA512
566a51751e6bdc67fb06d4bce8ce2141298475e34b6fdcdba42de2ca74eb02c19b10962707eb6bb96cc6f7ce202130b3d16a64b4feb4578a6cfaa322fefb57db
-
SSDEEP
6144:7SncRl9Fb3g/7CbCR5F5I5eJAdbyVTqkbtP:e4LZg/OoFS5Fbw
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1