General
-
Target
a8bd5b655845ba8a23a38abfd7e1bb03.bin
-
Size
407KB
-
Sample
241119-b25e6szark
-
MD5
65ebff9e48da14ffadff9fb1c0f5eedd
-
SHA1
9ceea47d9a55a80d2570bd4ea0942338836d5b9c
-
SHA256
0ee2a7df29906b7f4567d2861efddfe6302ee0c1b042aabcddec52f53190bc37
-
SHA512
d34b8c1440985ce4acd3f6159a55bdb92f9f73a2632b5e78a1a2861857be805fe63db35fe84cfbbc85771aacbd8c918333d85f50017d8e429c4e6357c7a42fc3
-
SSDEEP
12288:lIwekJYoPUXr0BCTK2VVr/MS9LUe52Hf8ue:lIw5JYoAtVVrUK2/8n
Behavioral task
behavioral1
Sample
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
45.84.199.152:7000
-
Install_directory
%Public%
-
install_file
Msedge.exe
Targets
-
-
Target
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc.exe
-
Size
867KB
-
MD5
a8bd5b655845ba8a23a38abfd7e1bb03
-
SHA1
90b245be80f5beb8b7b0e50bf910e1b4bff1f1cf
-
SHA256
f126b1c0b4ff973d9618b7287d011b61731c2b0e5e9960c72f5ef444288aa8dc
-
SHA512
f560893e04ee817be99c07a42ea654ce3f2ceaddcb3a644094a5316333ce85911f87eb06c10960673d53050e9b4a60410f0c61169c21e203014ba338138ed664
-
SSDEEP
12288:i98NVBjvwSRz04lj4k/GG6yY5adl8M64mzx8B/wmtilK6yEbx9:vV9vT5lj4MGdyY5SWv4mM/eyEr
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-