General
-
Target
videos_for_you.zip
-
Size
53.8MB
-
Sample
241128-sj455awrgq
-
MD5
3dcc2d70cc314a963a7f25d4cfef3bda
-
SHA1
29a282cb8bd5fd347ddcf0b74779ed599f77994c
-
SHA256
814bac694e1caa6e9a1825cc6e2da023b00e69b2eb8d30405145d55b211c49e2
-
SHA512
1c18386b7725e130112c3e710a1c178456b8279ed30ea44e748095d66b432f8647cf3c0fd12d4215af4091652f2a2229bbc817f5d6d087ff569bb6dc8fc6bb19
-
SSDEEP
786432:ffqdvtt0sJ+L7eGkjDVDNA0b7MbZ3233B5KZbrpi1sm5SJ6dqkj5+a4pdYTzMYTX:3pbL7e3DNN7b3KbhAS6dDkyXrTX
Static task
static1
Behavioral task
behavioral1
Sample
photo_for_you.png⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀��.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
42.96.11.54:25209
SFMa6Xk244Z6kSQr
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot5867862670:AAHp7ECfsTluhMCJC4Vl2YYZCQDdUtQ-o18
Extracted
gurcu
https://api.telegram.org/bot5867862670:AAHp7ECfsTluhMCJC4Vl2YYZCQDdUtQ-o18/sendMessage?chat_id=-4185548654
Targets
-
-
Target
photo_for_you.png⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀.exe
-
Size
57.1MB
-
MD5
f46aed0934318a70362ea9a3aed48fd0
-
SHA1
0fd0dc815197aa3f98118c1c993903c6b31f2c9c
-
SHA256
d07819f4da91a51777dd91789ad54c7efe81f2afa644761b6958de2322823ec4
-
SHA512
b6cc4106cdce94b7621f1fd57fff199272714fd2090ffc6d243ad89fefb08742d92dac3bfcd60c7bbfcddcebabc8bd12ce3136294f5003098b1deb66d3ea8b3e
-
SSDEEP
786432:swBPj4cKJ4hFek07BxrNWEBZ0k2fVmjhKXrPfkbq4j0hqrCkB5oM4zTu1rMEr6o3:swl1hFehrN9ZqBjXI0e/9wCl9rr3
-
Detect Xworm Payload
-
Gurcu family
-
Xworm family
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1