General
-
Target
Desktop.zip
-
Size
302KB
-
Sample
241118-sw6jqayqhv
-
MD5
80ae521089e5a975a2849a38dea66c7f
-
SHA1
9732e4fcbb5fe04ff6ff3f0a517b55e1da9d86fd
-
SHA256
cdcc31a5e04ae4bf0873bd78a29b69991e3632ec182d4b3ca328bf8071400628
-
SHA512
510d68106f339d9da862bcc87a7575598e3a35b16f912872fd8b61e410862902411cd74a29173e76d079ca09d134106a1a5a0eb2140ee3d43a483c1cf9e26d41
-
SSDEEP
6144:KqXFIbKXyoc5NwK9RscAVGwNvb/Trn6yj14y0nj7IUto8u9iEOv7J1B47m7oQo:K0FZcfweRscbwN7TrnV1Ij7f1YiEOVL4
Static task
static1
Behavioral task
behavioral1
Sample
ForceAdmin.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ForceAdmin.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New Text Document.ps1
Resource
win7-20240903-en
Malware Config
Extracted
xworm
https://pastebin.com/raw/L3Xphr0J:201770
-
install_file
Prefetch Manager.exe
-
pastebin_url
https://pastebin.com/raw/L3Xphr0J
Targets
-
-
Target
ForceAdmin.exe
-
Size
309KB
-
MD5
14938582caf4bbc6b2af665ca31fd60c
-
SHA1
289a2d81be847f58051891bf58b9699acd124874
-
SHA256
75eacbca3054af7502185379ce007e6dafb968dee4a29a0b17b2890aa12ebdc7
-
SHA512
3e40a71ab736e0156c2d1f18abb3b3b54314df0985041dd2a900e753b154c083340121a4c2a3d8820f73f608a21958dff71c73379509e08afecc2ac9388f5414
-
SSDEEP
6144:DX3IbK3TbvRsOANGkNPb/T+H6yjB4y1J3+C3L0ZOl7J5J4xm7o8Hy:T35RsOdkNbT+HVBRJ3+C3YZOfr2m7PHy
Score1/10 -
-
-
Target
New Text Document.txt
-
Size
222B
-
MD5
63029dc164817834daff27ac138a6110
-
SHA1
4ef3ef55421240d5232c1bad039ae6098ac17067
-
SHA256
ca18d4af4b98324369c6237d2e13d33f76a12cb4761c9d29ada553f67f38f98e
-
SHA512
fce9a92796b7a507186c902f1cc9bbac58a18f8cfa07f67638c8215f4f4183d17937bfeb003bc8cb4cb894cc8ba557efb023d91f7e492e64afde895daaf4dcae
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-