General
-
Target
99046c46f53b267124ac5242e1cc7e137da082dd8a98b698e299fd37b7ba662e
-
Size
520KB
-
Sample
241119-qd3c8s1mfq
-
MD5
e421c59a4fd0dc818769aed52138860c
-
SHA1
e8d58788b09ceb98b1d6df59706a2f2759bb2232
-
SHA256
99046c46f53b267124ac5242e1cc7e137da082dd8a98b698e299fd37b7ba662e
-
SHA512
a64b4ab565c0bc74904bb0eae8fd1466d322cd92c93787ed91706e13b8cd7cb7c38578b6724e5c5f63f7edcd1b48ce8aed27ed2f2efca9dab21808fc70b22052
-
SSDEEP
12288:ZyveQB/fTHIGaPkKEYzURNAwbAgrgRUgRvZ7Pg0Nc5vo:ZuDXTIGaPhEYzUzA0m5vZjg0NGvo
Static task
static1
Behavioral task
behavioral1
Sample
99046c46f53b267124ac5242e1cc7e137da082dd8a98b698e299fd37b7ba662e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
99046c46f53b267124ac5242e1cc7e137da082dd8a98b698e299fd37b7ba662e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
business-super.gl.at.ply.gg:62169
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7928045655:AAGXKGnSpTticz59k6sIY64CzUGLPjHsWl0/sendMessage?chat_id=6069705327
Targets
-
-
Target
99046c46f53b267124ac5242e1cc7e137da082dd8a98b698e299fd37b7ba662e
-
Size
520KB
-
MD5
e421c59a4fd0dc818769aed52138860c
-
SHA1
e8d58788b09ceb98b1d6df59706a2f2759bb2232
-
SHA256
99046c46f53b267124ac5242e1cc7e137da082dd8a98b698e299fd37b7ba662e
-
SHA512
a64b4ab565c0bc74904bb0eae8fd1466d322cd92c93787ed91706e13b8cd7cb7c38578b6724e5c5f63f7edcd1b48ce8aed27ed2f2efca9dab21808fc70b22052
-
SSDEEP
12288:ZyveQB/fTHIGaPkKEYzURNAwbAgrgRUgRvZ7Pg0Nc5vo:ZuDXTIGaPhEYzUzA0m5vZjg0NGvo
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-