General
-
Target
Dek Store.exe
-
Size
4.0MB
-
Sample
241117-pt73zszfla
-
MD5
0e24307ddf87b25a3ca7c5301a393633
-
SHA1
ec28111e105e95f3835f797d7b88b9ffa3f77683
-
SHA256
78644ac0e1fd8d30748e8980d15a0db7dfcd783e5b7b6f72b71d707d1799e1d9
-
SHA512
ae032bc7b20914d52deda07fbc50b593605863ebfb92a62c79cb6ea1efc92c14bb42f8abffc69404aca1f0b6dbf4579ab23d0e36189d371929faa7082be2e52b
-
SSDEEP
98304:pUZUZBlLQ8OLqmRdmgcmqPkGAnSG6qn4HoLVvrW1f:pjHQ8H0mgcRkGpG6wlr8
Static task
static1
Behavioral task
behavioral1
Sample
Dek Store.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
185.84.160.238:7000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
Dek Store.exe
-
Size
4.0MB
-
MD5
0e24307ddf87b25a3ca7c5301a393633
-
SHA1
ec28111e105e95f3835f797d7b88b9ffa3f77683
-
SHA256
78644ac0e1fd8d30748e8980d15a0db7dfcd783e5b7b6f72b71d707d1799e1d9
-
SHA512
ae032bc7b20914d52deda07fbc50b593605863ebfb92a62c79cb6ea1efc92c14bb42f8abffc69404aca1f0b6dbf4579ab23d0e36189d371929faa7082be2e52b
-
SSDEEP
98304:pUZUZBlLQ8OLqmRdmgcmqPkGAnSG6qn4HoLVvrW1f:pjHQ8H0mgcRkGpG6wlr8
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1