General
-
Target
s3_n.exe
-
Size
5.5MB
-
Sample
241203-l697bs1jax
-
MD5
0e747d8ff04debc20e1f2df6c71b9190
-
SHA1
76d41d66c9ede87d1aa52492a308087e2063e258
-
SHA256
adf1fdc27468d99ac5169485c733eb472d00c79ba4c4d07c7d7f396ca19d7d70
-
SHA512
ada850b09e34000e2e4d499ee1c915853ee646a2b8fe2da881541635ba3806eb0e035f08376359fb88696d8eabb08e3efd42f2cd60c4c73db431cc45a31c1e87
-
SSDEEP
49152:3eR7xTxs5J/ClgJZGq1XNWqAqaCeOw/efl7zYIx2jy5EJfDxY8bw0PXM2W0wplmP:OB4/CZzr8fl7EOE0mmS1
Static task
static1
Behavioral task
behavioral1
Sample
s3_n.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
s3_n.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
U7sKl0tpfhRT8PYA
-
Install_directory
%LocalAppData%
-
install_file
rundll64.exe
-
pastebin_url
https://pastebin.com/raw/EiiXCJbn
Targets
-
-
Target
s3_n.exe
-
Size
5.5MB
-
MD5
0e747d8ff04debc20e1f2df6c71b9190
-
SHA1
76d41d66c9ede87d1aa52492a308087e2063e258
-
SHA256
adf1fdc27468d99ac5169485c733eb472d00c79ba4c4d07c7d7f396ca19d7d70
-
SHA512
ada850b09e34000e2e4d499ee1c915853ee646a2b8fe2da881541635ba3806eb0e035f08376359fb88696d8eabb08e3efd42f2cd60c4c73db431cc45a31c1e87
-
SSDEEP
49152:3eR7xTxs5J/ClgJZGq1XNWqAqaCeOw/efl7zYIx2jy5EJfDxY8bw0PXM2W0wplmP:OB4/CZzr8fl7EOE0mmS1
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-