General
-
Target
8dafa10561f4e98f68c5ec171b6674c4.bin
-
Size
29KB
-
Sample
241203-btsreaspft
-
MD5
86f561bf8bffa6c0a5c2823c640b403c
-
SHA1
055366aadf51da12253ac057196a517d74a71b9c
-
SHA256
6be05a0f4a2896bf6d99d10eb6ac41c1fceb068c7c8a7c6acf39bba557df88e3
-
SHA512
4862ea86efd8245817a06c4681b32d88559df80a7aa5bf213f3f2218fad5f508d8e605cc55b3b9fe9a60cadc2815438daba5d4631083640de2bce3db06631212
-
SSDEEP
768:rL9wr0aF2qUxkXdHNI8FQNJD4Q6kEl/8jhiKwUdyeyNWjJ:v7puXdnQJokEZfSy8jJ
Behavioral task
behavioral1
Sample
9e908ab143b191502a5ada13123baae848c9c2d6d59b3190d0c2d8ed18257ac2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e908ab143b191502a5ada13123baae848c9c2d6d59b3190d0c2d8ed18257ac2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
main-carnival.gl.at.ply.gg:7329
9sDMRFhiOQaxtyhh
-
Install_directory
%AppData%
-
install_file
powerpoidnt-run.exe
Targets
-
-
Target
9e908ab143b191502a5ada13123baae848c9c2d6d59b3190d0c2d8ed18257ac2.exe
-
Size
403KB
-
MD5
8dafa10561f4e98f68c5ec171b6674c4
-
SHA1
a41a738fc81df39b2f818f323d0a99bc6d952de2
-
SHA256
9e908ab143b191502a5ada13123baae848c9c2d6d59b3190d0c2d8ed18257ac2
-
SHA512
48ab1db5cf80310a6e73b2fe5defdbe111077bdbac09333c22c34ab86a7d734fa0b193d39f4b4a7698ba3c4421b27217a94fbc5bf6db869dff42aceba4d3d336
-
SSDEEP
1536:80W+2++0XhzUFY9S1I6rOp7Ronkccckccccc6:80W9++ahzUFY9STOp1ona
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1