General
-
Target
XBinderOutput.exe
-
Size
5.9MB
-
Sample
241118-d9775syajn
-
MD5
60f03d0114c4a2d8482d9dfe83d0af60
-
SHA1
73f8ada208b9ec7741e4bf4acd5ddf5a4bdcde1a
-
SHA256
93e3e42353e27711fb81201a6381ccce33579b9724f076b42a918b5c85ccb5eb
-
SHA512
455dca87350e0fbd945c501b4c035340650ff12359dc10f28e70a91a98b611cd4ee9545d64a800be91792a85d6db101aeee996752c196ecabba7bbb4cbf38697
-
SSDEEP
98304:o39KIlNDBJ9AwQSHN3/cqY5w2ZVrBYn3zT9bARVx4qpAXAAry8WeRSOHgitPWhj:eDX95cZpLBmSVxz4AA28WeRJHgit+hj
Static task
static1
Behavioral task
behavioral1
Sample
XBinderOutput.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
xworm
man-laughing.gl.at.ply.gg:57783
-
Install_directory
%LocalAppData%
-
install_file
Windows Data Compiler.exe
Targets
-
-
Target
XBinderOutput.exe
-
Size
5.9MB
-
MD5
60f03d0114c4a2d8482d9dfe83d0af60
-
SHA1
73f8ada208b9ec7741e4bf4acd5ddf5a4bdcde1a
-
SHA256
93e3e42353e27711fb81201a6381ccce33579b9724f076b42a918b5c85ccb5eb
-
SHA512
455dca87350e0fbd945c501b4c035340650ff12359dc10f28e70a91a98b611cd4ee9545d64a800be91792a85d6db101aeee996752c196ecabba7bbb4cbf38697
-
SSDEEP
98304:o39KIlNDBJ9AwQSHN3/cqY5w2ZVrBYn3zT9bARVx4qpAXAAry8WeRSOHgitPWhj:eDX95cZpLBmSVxz4AA28WeRJHgit+hj
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1