General
-
Target
Xeno.exe
-
Size
70KB
-
Sample
241118-rkh4lstjdk
-
MD5
1edee495fc92dcfdbfb89c0202f87b29
-
SHA1
38d6c9154e066daa75d9a4f2346a1b7b7c84da2b
-
SHA256
d87423760f97f5010d3589c0e7d5e704a698b4562b5d9de627b6d756a29cefe3
-
SHA512
11709a00d0b5bb50b172344295c216f51a450d5e936fb15c5834a6a167d1ef75e1d510f94ff2105b87f41b1ff607843d4e365c056693e8b5a1d873bae013d1ac
-
SSDEEP
1536:mvdK/frfAdNtG6zJllzZ+bPsag6Ha3OqY7l:LEXQM+bPsWa3Oqul
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xeno.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
20.ip.gl.ply.gg:53128
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
Xeno.exe
-
Size
70KB
-
MD5
1edee495fc92dcfdbfb89c0202f87b29
-
SHA1
38d6c9154e066daa75d9a4f2346a1b7b7c84da2b
-
SHA256
d87423760f97f5010d3589c0e7d5e704a698b4562b5d9de627b6d756a29cefe3
-
SHA512
11709a00d0b5bb50b172344295c216f51a450d5e936fb15c5834a6a167d1ef75e1d510f94ff2105b87f41b1ff607843d4e365c056693e8b5a1d873bae013d1ac
-
SSDEEP
1536:mvdK/frfAdNtG6zJllzZ+bPsag6Ha3OqY7l:LEXQM+bPsWa3Oqul
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-