General
-
Target
LibraryDownload.exe
-
Size
171KB
-
Sample
241203-v48p6a1naj
-
MD5
0f4733702f7441130c76f92271e33d52
-
SHA1
962c64538ad4b11b0a57a269e726476eaf1e5cd4
-
SHA256
b96640cb2a36f9bbaf48fe4798091068b9f518af783236e759763f2386f6a157
-
SHA512
3718e10cdbb2dd1089a3cc4437c0884593ed0194953e0e0d6865b33475ffd2d8b9bcdffe5e8fade78eb4078b6777ca65618617a2563007b77998c273d85be0f5
-
SSDEEP
3072:vOMQnN3iDf+bpT7E3ubGoOmaG8vwps/Bz65/M6If+3Js+3JFkKeTnu:vOnxwWboub+As/xBt25
Behavioral task
behavioral1
Sample
LibraryDownload.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LibraryDownload.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
designed-paragraph.gl.at.ply.gg:6553
-
Install_directory
%AppData%
-
install_file
OneDrive.exe
-
telegram
https://api.telegram.org/bot7632521130:AAFUdxmN095QSre97Sy3YKm36m78BuQCg7g/sendMessage?chat_id=6370415730
Targets
-
-
Target
LibraryDownload.exe
-
Size
171KB
-
MD5
0f4733702f7441130c76f92271e33d52
-
SHA1
962c64538ad4b11b0a57a269e726476eaf1e5cd4
-
SHA256
b96640cb2a36f9bbaf48fe4798091068b9f518af783236e759763f2386f6a157
-
SHA512
3718e10cdbb2dd1089a3cc4437c0884593ed0194953e0e0d6865b33475ffd2d8b9bcdffe5e8fade78eb4078b6777ca65618617a2563007b77998c273d85be0f5
-
SSDEEP
3072:vOMQnN3iDf+bpT7E3ubGoOmaG8vwps/Bz65/M6If+3Js+3JFkKeTnu:vOnxwWboub+As/xBt25
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1