General
-
Target
XWorm.rar
-
Size
59.1MB
-
Sample
241118-gndyysvngj
-
MD5
6ec728dd292a8e1f39cd6baea415ff66
-
SHA1
e1103f0af9d27f5c56667d98a36dd40ab5ec8392
-
SHA256
c03c2ec5ef0958a61a913e2bfb80a420a030f579858cc203b3d2bc3b938400cd
-
SHA512
ffc584bfb586e7c123f5e7c153fd9e9187e7010e7b4bce9ae590c05961bbbfa46b4c2f25ded830626e30aea919cec31f7026ccf699510f8cccb1921507829a40
-
SSDEEP
1572864:c3UGEBh79oS6ea3nG8zWxYKClanZV79oS6eaqAHRvr:QEBhxb6eaxixDnZVxb6eaFJ
Malware Config
Extracted
xworm
5.0
127.0.0.1:7777
h-asset.gl.at.ply.gg:7777
lEKFfsS3mf7zGun2
-
Install_directory
%LocalAppData%
-
install_file
RobloxBud.exe
Targets
-
-
Target
XWorm.rar
-
Size
59.1MB
-
MD5
6ec728dd292a8e1f39cd6baea415ff66
-
SHA1
e1103f0af9d27f5c56667d98a36dd40ab5ec8392
-
SHA256
c03c2ec5ef0958a61a913e2bfb80a420a030f579858cc203b3d2bc3b938400cd
-
SHA512
ffc584bfb586e7c123f5e7c153fd9e9187e7010e7b4bce9ae590c05961bbbfa46b4c2f25ded830626e30aea919cec31f7026ccf699510f8cccb1921507829a40
-
SSDEEP
1572864:c3UGEBh79oS6ea3nG8zWxYKClanZV79oS6eaqAHRvr:QEBhxb6eaxixDnZVxb6eaFJ
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-