General
-
Target
8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff
-
Size
832KB
-
Sample
241203-a5r4ks1mhx
-
MD5
b4e1f9d294cf60e72e3050b7c3cac673
-
SHA1
9b24c22843d523aca1dc3c3cc3e1c5f47e4cb06e
-
SHA256
8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff
-
SHA512
840a28ad80ca371b00a5f5a0f3db48f003f71d2bd0fa93914ff575bca4e6f3e65c6b7b53957c0363a594cde948e5b87fa93b219e0d1c0082559db5a72364631c
-
SSDEEP
24576:TuDXTIGaPhEYzUzA01c9Iyokff+DEZB36NvWiVo/UeQZ0:6Djlabwz9CxZ56NOiVg+0
Static task
static1
Behavioral task
behavioral1
Sample
8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:36077
23.ip.gl.ply.gg:36077
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff
-
Size
832KB
-
MD5
b4e1f9d294cf60e72e3050b7c3cac673
-
SHA1
9b24c22843d523aca1dc3c3cc3e1c5f47e4cb06e
-
SHA256
8f09ed557e41e7fcc2be5148ea38d2a7e8d2c8df018131de9762b7af940589ff
-
SHA512
840a28ad80ca371b00a5f5a0f3db48f003f71d2bd0fa93914ff575bca4e6f3e65c6b7b53957c0363a594cde948e5b87fa93b219e0d1c0082559db5a72364631c
-
SSDEEP
24576:TuDXTIGaPhEYzUzA01c9Iyokff+DEZB36NvWiVo/UeQZ0:6Djlabwz9CxZ56NOiVg+0
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-