General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241117-w78d8swclc
-
MD5
1a76cd545f61ab6f965ae5993b17ce2f
-
SHA1
900c219ab0607cec8bbf66db64c66e73272060e4
-
SHA256
44f611726336cec3fa65ba287bf135af2cd43c6441ead65ce4a54c154ea80f90
-
SHA512
78515c77b7d93f23203269771a2f75a47910070c3173516e541c6c566f8e016eb96d53cbf4850b5ba5d33c81d59f99f47400e2fffe0c479ef5e77532731993c9
-
SSDEEP
49152:MPmiqmEQ+gM0zmOEULu1rnhgR8tub1xBEXFe3IsS:6X+7sm9Dg2dXFMJ
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
87.120.112.33:8398
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
1a76cd545f61ab6f965ae5993b17ce2f
-
SHA1
900c219ab0607cec8bbf66db64c66e73272060e4
-
SHA256
44f611726336cec3fa65ba287bf135af2cd43c6441ead65ce4a54c154ea80f90
-
SHA512
78515c77b7d93f23203269771a2f75a47910070c3173516e541c6c566f8e016eb96d53cbf4850b5ba5d33c81d59f99f47400e2fffe0c479ef5e77532731993c9
-
SSDEEP
49152:MPmiqmEQ+gM0zmOEULu1rnhgR8tub1xBEXFe3IsS:6X+7sm9Dg2dXFMJ
-
Detect Xworm Payload
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-