General
-
Target
fefdc209dd00aa6b367c278e8f8fe4f8660336d60d89d4691bc87c79a14006e4.exe
-
Size
49KB
-
Sample
241202-pbs64symbn
-
MD5
bc0114849adf8a6d23e9f2e9f1f9cde2
-
SHA1
7566c1ff77a92f42c4464dcec68a1908a32fee9d
-
SHA256
fefdc209dd00aa6b367c278e8f8fe4f8660336d60d89d4691bc87c79a14006e4
-
SHA512
a5271f943ba8ff980d5777eaef5ebf86ba9d1b62d6b83d4f45e94424ac5b72a24c1969c4deeb683b04ffc6acba70f90b6ffda0260fdb2ba118d9d5dd1c54f61c
-
SSDEEP
1536:jNxkpGR8oLLWSr/zbMLiZsbe3PyrlOl8810E:jNSpQbFr/zbMuZs/lOl8810E
Behavioral task
behavioral1
Sample
fefdc209dd00aa6b367c278e8f8fe4f8660336d60d89d4691bc87c79a14006e4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fefdc209dd00aa6b367c278e8f8fe4f8660336d60d89d4691bc87c79a14006e4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.0
customers-incomplete.gl.at.ply.gg:2299
-
Install_directory
%Temp%
-
install_file
USB.exe
Targets
-
-
Target
fefdc209dd00aa6b367c278e8f8fe4f8660336d60d89d4691bc87c79a14006e4.exe
-
Size
49KB
-
MD5
bc0114849adf8a6d23e9f2e9f1f9cde2
-
SHA1
7566c1ff77a92f42c4464dcec68a1908a32fee9d
-
SHA256
fefdc209dd00aa6b367c278e8f8fe4f8660336d60d89d4691bc87c79a14006e4
-
SHA512
a5271f943ba8ff980d5777eaef5ebf86ba9d1b62d6b83d4f45e94424ac5b72a24c1969c4deeb683b04ffc6acba70f90b6ffda0260fdb2ba118d9d5dd1c54f61c
-
SSDEEP
1536:jNxkpGR8oLLWSr/zbMLiZsbe3PyrlOl8810E:jNSpQbFr/zbMuZs/lOl8810E
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1