General
-
Target
27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462N.exe
-
Size
41KB
-
Sample
241203-j9tyeaxkfv
-
MD5
55e5b9b534e7bffe1f43517db9506ae0
-
SHA1
d55f7b182592307d8bd60a397b5b9b1f93fa9978
-
SHA256
27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462
-
SHA512
cce1f9cf7f10500c04ac9e71b0b07fe04ffe77de6955a93795dafb9fa0559e58eeba54b2f2d8b17d0bff537cbe9ffee6f1a3464dd5b716cb7c1f25f4acdaef2f
-
SSDEEP
768:cGFDV1EkGq5VuKlP0Rl0hQvvdF3q9iev6TO+h2IkAC:tFDRL5MKx07wQvFF69iu6TO+IsC
Behavioral task
behavioral1
Sample
27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462N.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
5.0
193.161.193.99:57817
jw11mUPspuncXMvt
-
install_file
USB.exe
Targets
-
-
Target
27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462N.exe
-
Size
41KB
-
MD5
55e5b9b534e7bffe1f43517db9506ae0
-
SHA1
d55f7b182592307d8bd60a397b5b9b1f93fa9978
-
SHA256
27c5259e178974a6fbc4c478d8c30b85262754ae2ce620e2c7295dab9d9df462
-
SHA512
cce1f9cf7f10500c04ac9e71b0b07fe04ffe77de6955a93795dafb9fa0559e58eeba54b2f2d8b17d0bff537cbe9ffee6f1a3464dd5b716cb7c1f25f4acdaef2f
-
SSDEEP
768:cGFDV1EkGq5VuKlP0Rl0hQvvdF3q9iev6TO+h2IkAC:tFDRL5MKx07wQvFF69iu6TO+IsC
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-