General
-
Target
CYN_VIRUS_DISCORD_NUKER.exe
-
Size
63KB
-
Sample
241122-bmfhha1mez
-
MD5
aa99b75aaf8a18993f55701007b48a35
-
SHA1
d0d68462f15a38cd1a63e5bd7dd035e560cf3e61
-
SHA256
66e6b3c3ccddd378cd588b2b99fe06cf4a1b9ab329eefd86f8fe540770432de3
-
SHA512
f75ddc23776a0e5b13109c47c27a1e63dc5b6245977f0c84d5572c55134f4450841371bd1d0322a9b81dc7ef528ce462ddb27e5891ebb9dd9335595dd7c291ba
-
SSDEEP
1536:iXpNx7J5s0vmpn1rZ6v19P9bvmV8aEXxrb5WxlOYcR9:iXpr7Jmemyt19beV8nOfOY29
Behavioral task
behavioral1
Sample
CYN_VIRUS_DISCORD_NUKER.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
147.185.221.23:33942
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
CYN_VIRUS_DISCORD_NUKER.exe
-
Size
63KB
-
MD5
aa99b75aaf8a18993f55701007b48a35
-
SHA1
d0d68462f15a38cd1a63e5bd7dd035e560cf3e61
-
SHA256
66e6b3c3ccddd378cd588b2b99fe06cf4a1b9ab329eefd86f8fe540770432de3
-
SHA512
f75ddc23776a0e5b13109c47c27a1e63dc5b6245977f0c84d5572c55134f4450841371bd1d0322a9b81dc7ef528ce462ddb27e5891ebb9dd9335595dd7c291ba
-
SSDEEP
1536:iXpNx7J5s0vmpn1rZ6v19P9bvmV8aEXxrb5WxlOYcR9:iXpr7Jmemyt19beV8nOfOY29
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1