General
-
Target
lamysoft.exe
-
Size
115KB
-
Sample
241117-pfkqjatpgq
-
MD5
e716953f2f1a17a9e1e00d03c022267e
-
SHA1
7f63945c042018d1688c77abc4d6c171b763a527
-
SHA256
7e61107c764e924e2e7b2dfca37bf2d8f6c440014a92e69bdd6d70ae84dde8c8
-
SHA512
450a53a41bd517faf298728efabd599fc983caa3197e9a04e6674179ca0d26e7cd92341033ae71ebd3ab40277b997cf9923b596a9498dbddfd0ebc62186a2449
-
SSDEEP
3072:2G1gT1mBpTl5JcIdm++b8IaGGWxBOo9gn/Ufv3hsX:2GGm3LJJdmnbzaGZ3S/iv3
Behavioral task
behavioral1
Sample
lamysoft.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
lamysoft.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:47359
23.ip.gl.ply.gg:47359
-
Install_directory
%AppData%
-
install_file
rat.exe
-
telegram
https://api.telegram.org/bot7327399950:AAEE8XHvYDeAYqClq1sW-CApcW7Mmn1gxoQ/sendMessage?chat_id=7223021103
Targets
-
-
Target
lamysoft.exe
-
Size
115KB
-
MD5
e716953f2f1a17a9e1e00d03c022267e
-
SHA1
7f63945c042018d1688c77abc4d6c171b763a527
-
SHA256
7e61107c764e924e2e7b2dfca37bf2d8f6c440014a92e69bdd6d70ae84dde8c8
-
SHA512
450a53a41bd517faf298728efabd599fc983caa3197e9a04e6674179ca0d26e7cd92341033ae71ebd3ab40277b997cf9923b596a9498dbddfd0ebc62186a2449
-
SSDEEP
3072:2G1gT1mBpTl5JcIdm++b8IaGGWxBOo9gn/Ufv3hsX:2GGm3LJJdmnbzaGZ3S/iv3
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-