General
-
Target
menu.exe
-
Size
327KB
-
Sample
241118-cm8dysvhrg
-
MD5
0f7fea309ccdc6ba53737fb6d88fcfd3
-
SHA1
0f3dfdcbbdb0412cbee95c87a366578da973f07b
-
SHA256
8b777ba206b3be169e56502581528eb3735c758a8e3c8a0f6b4479ddfc92bb78
-
SHA512
f123781d84ad83a885aa0a4916be9b40adb87090eb301cd9afcf652cbbfd4deaac1f91b09b616d360f1bf70dbb430a99f5226b118140e21f02d5df2deaff133e
-
SSDEEP
6144:4PQGXEB3uR4D7P05EkRTwEur5447h/PcHnUSFIT7JHoI0E7YPWs3kZ4sUT:4QapW/PqbTw3FcHUSFU1v0E7v43T
Static task
static1
Behavioral task
behavioral1
Sample
menu.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
85.209.133.220:111
-
Install_directory
%Userprofile%
-
install_file
system.exe
Targets
-
-
Target
menu.exe
-
Size
327KB
-
MD5
0f7fea309ccdc6ba53737fb6d88fcfd3
-
SHA1
0f3dfdcbbdb0412cbee95c87a366578da973f07b
-
SHA256
8b777ba206b3be169e56502581528eb3735c758a8e3c8a0f6b4479ddfc92bb78
-
SHA512
f123781d84ad83a885aa0a4916be9b40adb87090eb301cd9afcf652cbbfd4deaac1f91b09b616d360f1bf70dbb430a99f5226b118140e21f02d5df2deaff133e
-
SSDEEP
6144:4PQGXEB3uR4D7P05EkRTwEur5447h/PcHnUSFIT7JHoI0E7YPWs3kZ4sUT:4QapW/PqbTw3FcHUSFU1v0E7v43T
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-