General
-
Target
5d7ba3966a48563f7e6b3e2161df4161.png
-
Size
174KB
-
Sample
241118-wjfdjs1qfv
-
MD5
3d83f69ea35a4f67a5affa842a02cda9
-
SHA1
0b02a589b5716d85163d6f0a275b5694370d8185
-
SHA256
92928576a5025f65731d63ef466da320c30d77597870966a0ec1c8adb742495b
-
SHA512
3f3f9bb917dc4957d160a4bb4d8b3a6238193d8b4dbab0514a95bd703682c74be936af9815ac03a65254ece579f251ea67443c8a045c1afb89b18ecda18617a5
-
SSDEEP
3072:hWLLhhZ7r1/DbdJnjtasC7vl9DX61WMRU1fFFQBSPFdOC5mfvq7atuQ:hWnlv1/PXjtaJ7HDX61dRU1NiyjA5tt
Static task
static1
Malware Config
Extracted
xworm
man-laughing.gl.at.ply.gg:57783
-
Install_directory
%LocalAppData%
-
install_file
Windows Data Compiler.exe
Targets
-
-
Target
5d7ba3966a48563f7e6b3e2161df4161.png
-
Size
174KB
-
MD5
3d83f69ea35a4f67a5affa842a02cda9
-
SHA1
0b02a589b5716d85163d6f0a275b5694370d8185
-
SHA256
92928576a5025f65731d63ef466da320c30d77597870966a0ec1c8adb742495b
-
SHA512
3f3f9bb917dc4957d160a4bb4d8b3a6238193d8b4dbab0514a95bd703682c74be936af9815ac03a65254ece579f251ea67443c8a045c1afb89b18ecda18617a5
-
SSDEEP
3072:hWLLhhZ7r1/DbdJnjtasC7vl9DX61WMRU1fFFQBSPFdOC5mfvq7atuQ:hWnlv1/PXjtaJ7HDX61dRU1NiyjA5tt
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-