General
-
Target
18ea5087eb82e075ca35d2b2dcff9450.bin
-
Size
472KB
-
Sample
241126-bde6dawjby
-
MD5
f48464b9ef69aefbadfd2ef5f44e70db
-
SHA1
29399001a5e806e68bb0c9fafed70f2087de717b
-
SHA256
6bc169f4ce1c914bce0a10681748f1e5a1faeb8cd5257bdd0340bee2ede6335b
-
SHA512
dc5ae55d5404304db4f2c2dacd273c9fc38662f969ffb92cc7e895ef187e53fdb4aa9a1386e34b69fbadc181f08e14dba8caf30ce8bfbd879e58be60bbf74dc7
-
SSDEEP
12288:oQWtGUtdlgrfoFVCHitZAKn3ZMmwRD4No0+rvJd2QhO1F:VWtFfDbZzM7pI+rxdZOf
Static task
static1
Behavioral task
behavioral1
Sample
a7247c64cc0168290ca3b210e59ef629b46f513205bc6562ec79cdd2cda71725.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a7247c64cc0168290ca3b210e59ef629b46f513205bc6562ec79cdd2cda71725.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.1
87.121.86.8:4020
ssjpS2lhbkGsnEgT
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
a7247c64cc0168290ca3b210e59ef629b46f513205bc6562ec79cdd2cda71725.exe
-
Size
555KB
-
MD5
18ea5087eb82e075ca35d2b2dcff9450
-
SHA1
dc436fbaa777672d44a8b90b98c4a1c266885845
-
SHA256
a7247c64cc0168290ca3b210e59ef629b46f513205bc6562ec79cdd2cda71725
-
SHA512
8fbeb3caf13a3fe1359002c2848ff5767e6b2f226049546c683f2b6144756196cfe39f66e4959c8426cdfaeff6a169a4cf5939de241e4a898887d8810ec620c6
-
SSDEEP
12288:32EIiN/Z1++w1p+wJuQbIgJwCQBk5wBcamd3ZhZs:3wiN/K+wHBfhQBk5s3mdPZs
-
Detect Xworm Payload
-
Guloader family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
75ed96254fbf894e42058062b4b4f0d1
-
SHA1
996503f1383b49021eb3427bc28d13b5bbd11977
-
SHA256
a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
-
SHA512
58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
SSDEEP
192:X24sihno0bW+l97H4GB7QDs91kMtwtobTr4u+QHbazMNHT7dmNIEr:m8vJl97JeoxtN/r3z7YV
Score3/10 -