General
-
Target
7f216847540eb24e6b645d97d6836f95.bin
-
Size
19KB
-
Sample
241203-bqklmaylgr
-
MD5
4f806d9db4ea453294680b76cd51ac00
-
SHA1
90fdb6858e8c9cbf9d58e4a0734c72d1e0a1a6d1
-
SHA256
18b30e159c3a4beb035810255176dbf6fa211fffde6986bc759bd063161994fb
-
SHA512
4c3ca721a2daeccd5d5f396428fb91a50ffa309fd7e9032293aaa6b38729eb02393bd4f1aa30130e70cd02c503bd1761ab08e3be4c03b4ad45440975dd61e928
-
SSDEEP
384:SV/VVmPsHOyWBYxVmJJ4ToIte+32dpf9G2tWPTS/x9iYPAu8J:+2QOCxVmJiTooR2db3W7SYue
Behavioral task
behavioral1
Sample
f8dbc4373a048b0c649a6f8ab4bc3e9834911846175be93564afe23eb21e4973.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f8dbc4373a048b0c649a6f8ab4bc3e9834911846175be93564afe23eb21e4973.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
cnet-contracting.gl.at.ply.gg:10206
YF672s6uKBT9jk3V
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
f8dbc4373a048b0c649a6f8ab4bc3e9834911846175be93564afe23eb21e4973.exe
-
Size
40KB
-
MD5
7f216847540eb24e6b645d97d6836f95
-
SHA1
972a3de4838c5ea7ed10cd6a318942e4ddb0509f
-
SHA256
f8dbc4373a048b0c649a6f8ab4bc3e9834911846175be93564afe23eb21e4973
-
SHA512
1c20355e247c60b194261a49f5af65f96432789ead0ca289b9685245e3579ab19e64f96279815d9b520ed7ad025f5d6d6764391a9266ae0a8b5b61d9fbaf9692
-
SSDEEP
768:9UIDwCrxY4mpc9i32v6hCuuJf27ZZfFWPG9//v6OOwh9jGb2:9dDwCFY4gckGwCuuJfKFv9//v6OOwHCq
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1