General
-
Target
ed217363c6941d6973c68018b3579703fcb2e3dcc903f868f3c17a04bef57c82
-
Size
415KB
-
Sample
241202-mfs1ss1jet
-
MD5
08db00b200723dad6067e9c99cdc819a
-
SHA1
bf455fe05eb3ac9b0248efef33254befa7f035a2
-
SHA256
ed217363c6941d6973c68018b3579703fcb2e3dcc903f868f3c17a04bef57c82
-
SHA512
486bc356496b64c6d5f5387d24cdead7a8ccaec393120dc95689dac6a5b759739cf6255150d3a7914d95bc9f5fe16e02212d888f160abb91c58e8f852bbd78b5
-
SSDEEP
12288:FoaYwa+54OxqfeXzZCrzE9IYXuSf4x/nv4MTaxnKXxXaa:Fiw94OcAzwYIY+Sf4x/zTJX5aa
Static task
static1
Behavioral task
behavioral1
Sample
Datasheet.scr
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
7r54Iv7WwsTgLPOp
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/UjEMadMV
Targets
-
-
Target
Datasheet.scr
-
Size
476KB
-
MD5
eb23d50af27df1288faf92898cccc3d3
-
SHA1
f82e28701d256af04e7728c19dd5329dd23760f2
-
SHA256
0e2ab563262e27e9095c4c1e055d25974c7f8d767de7d97d8943306268a54d33
-
SHA512
70fa97b3620b569d4f304b97a3f22ea720b4dcc8007301ee0a54b3d9f901670962a08becd45b43838506d88a6b5eb4a5e4a6e43b26eb5b30202ac5f2c403c457
-
SSDEEP
12288:o8PZsrAXeXzKinig6dpXnWq4U5usx+Xti:o80zKhHV4Ux
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2