General
-
Target
1d3dd8cded39d5fd34a6d750a17b952d919e18ae457f7c3343426108c8924a59
-
Size
406KB
-
Sample
241119-xv35esvqgj
-
MD5
7772cf3e9c73dca91050f851462c83fa
-
SHA1
664e76fdf09952eced7614cb1fea512ec9dc328b
-
SHA256
1d3dd8cded39d5fd34a6d750a17b952d919e18ae457f7c3343426108c8924a59
-
SHA512
7f3c66787645adb2238fedef9110629f7d25379612140ea75335c303c114eebd4eb270b378183dda1b1611d524d4388e8c99f9faf2183a3ea5d825bafbb4ece7
-
SSDEEP
6144:Ra1V2G0DaOqOAiBBOF2Ot5LDTK7SjmF9pjYoi3gj3x1jQ9Ton6YoKO:Y1o3DaPEHefuZEoi3wU9To6H
Static task
static1
Behavioral task
behavioral1
Sample
product sample requirement.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
teebro1800.dynamic-dns.net:2195
wyDwhmVwMImivlWa
-
install_file
USB.exe
Targets
-
-
Target
product sample requirement.exe
-
Size
438KB
-
MD5
07d5a83558349a82cfa1dc6d68f4d84b
-
SHA1
064af18045030703bc4c62c99f1abe5700832e8a
-
SHA256
096b33571e80d18c1763a3bd5d019e3177f1547b3ca6e6205a349075ce2fec18
-
SHA512
aa9d794e0ffb14163f3d1c2df374b99da287b7ce1df965e271921a700a9972c6ead3830f0319eb9ec2d1352e2c0a06bb192045e482b2d54fe091c29dc58946bf
-
SSDEEP
12288:pMFo7mq6/FqLzEvttwVnGUaGtyk6JXFajEHUC:pko7mq+I/EOoEIr
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-