General
-
Target
58f9f63d8670db392456194af508ecd14dc67e6cb6c12bb97e6dc3c6e6a235c8.exe
-
Size
168KB
-
Sample
241118-tl758szekh
-
MD5
aee93634e5040dc2a7ae6ebc7e06b952
-
SHA1
41f2ab5f784252217a5c1516cd76dbffd67bbeac
-
SHA256
58f9f63d8670db392456194af508ecd14dc67e6cb6c12bb97e6dc3c6e6a235c8
-
SHA512
673ed7d77a1b025c120f9e99bc81e857158420adc380094b620b62ce9c38daf8f7b11d9788d1861da0cff71285fba228f80f2c8a872589f47373eb126b65f06e
-
SSDEEP
3072:gwe+6Rkd+MisaP1JmK6Hw9hEgXEp1NDLfgAiKgD7fYtB2SOEQW40/mmo0ioiM:glbRFLsaPfmK6HwXDXsFglf7gya4tmB
Static task
static1
Behavioral task
behavioral1
Sample
58f9f63d8670db392456194af508ecd14dc67e6cb6c12bb97e6dc3c6e6a235c8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
58f9f63d8670db392456194af508ecd14dc67e6cb6c12bb97e6dc3c6e6a235c8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.1
activities-mustang.gl.at.ply.gg:54756
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
58f9f63d8670db392456194af508ecd14dc67e6cb6c12bb97e6dc3c6e6a235c8.exe
-
Size
168KB
-
MD5
aee93634e5040dc2a7ae6ebc7e06b952
-
SHA1
41f2ab5f784252217a5c1516cd76dbffd67bbeac
-
SHA256
58f9f63d8670db392456194af508ecd14dc67e6cb6c12bb97e6dc3c6e6a235c8
-
SHA512
673ed7d77a1b025c120f9e99bc81e857158420adc380094b620b62ce9c38daf8f7b11d9788d1861da0cff71285fba228f80f2c8a872589f47373eb126b65f06e
-
SSDEEP
3072:gwe+6Rkd+MisaP1JmK6Hw9hEgXEp1NDLfgAiKgD7fYtB2SOEQW40/mmo0ioiM:glbRFLsaPfmK6HwXDXsFglf7gya4tmB
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-