General
-
Target
Xworm.V6.0.zip
-
Size
28.7MB
-
Sample
241129-ej8xeszlgm
-
MD5
ce625cf1e3e25d470c2e7a298409dab2
-
SHA1
94f465e9baa3099c2a7b8e5d30e8fc481b0b41a3
-
SHA256
6b66904ae1929991852392fe2d578712738799cdd82539507d714f536eb8e0ed
-
SHA512
0ac55745455542d68be326f5e5d48131da093ba47c24cfd06c2be0f3f0651219bf692b3fed5ac62cd16a191c0f7852b73ef8bc709f344eb3b36948b44bc3a480
-
SSDEEP
786432:OHqaRtCZZfm0+lGmlNinnXEDggGiO72vAgbHGaG:OHqytCO0+lF0hgGZNgbHGp
Behavioral task
behavioral1
Sample
Xworm.V6.0.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Xworm.V6.0.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
EEarXqazEvX73BCq
-
Install_directory
%AppData%
-
install_file
Chrome Update.exe
-
pastebin_url
https://pastebin.com/raw/RPPi3ByL
Targets
-
-
Target
Xworm.V6.0.zip
-
Size
28.7MB
-
MD5
ce625cf1e3e25d470c2e7a298409dab2
-
SHA1
94f465e9baa3099c2a7b8e5d30e8fc481b0b41a3
-
SHA256
6b66904ae1929991852392fe2d578712738799cdd82539507d714f536eb8e0ed
-
SHA512
0ac55745455542d68be326f5e5d48131da093ba47c24cfd06c2be0f3f0651219bf692b3fed5ac62cd16a191c0f7852b73ef8bc709f344eb3b36948b44bc3a480
-
SSDEEP
786432:OHqaRtCZZfm0+lGmlNinnXEDggGiO72vAgbHGaG:OHqytCO0+lF0hgGZNgbHGp
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1