General
-
Target
Wave-Setup.exe
-
Size
73KB
-
Sample
241122-xnjr7sslgq
-
MD5
c98b26b1cac8a447066be6bd5a933196
-
SHA1
b22d43bc742b4cc866b62b2cfb62e8362e10163e
-
SHA256
e6025c036e5f0bcd3142f2fea80ebe5416c3aa0b64e94d0b5a7c1577c651d609
-
SHA512
98ea361a0c8c9f79e446bc0de58f23d23fa264d1741f2cb23141ad85f4e1cf45b7fcd18249473e48041ac3186d3793d0e6b1af1ea8393cf7429fd75c251c2e50
-
SSDEEP
1536:YsqiPx3ozEViBTK2Y03OboS8k8gvS6AjhOSdNo4fHId:YsrPpUEVAe+OboS8kZuhOSdN7G
Behavioral task
behavioral1
Sample
Wave-Setup.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
xworm
127.0.0.1:7771
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot7665061051:AAEotbTL5fqrPYkfW44hc7ymOmd_OEVX4KY/sendMessage?chat_id=5622184120
Targets
-
-
Target
Wave-Setup.exe
-
Size
73KB
-
MD5
c98b26b1cac8a447066be6bd5a933196
-
SHA1
b22d43bc742b4cc866b62b2cfb62e8362e10163e
-
SHA256
e6025c036e5f0bcd3142f2fea80ebe5416c3aa0b64e94d0b5a7c1577c651d609
-
SHA512
98ea361a0c8c9f79e446bc0de58f23d23fa264d1741f2cb23141ad85f4e1cf45b7fcd18249473e48041ac3186d3793d0e6b1af1ea8393cf7429fd75c251c2e50
-
SSDEEP
1536:YsqiPx3ozEViBTK2Y03OboS8k8gvS6AjhOSdNo4fHId:YsrPpUEVAe+OboS8kZuhOSdN7G
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-