General
-
Target
Versal Open beta.zip
-
Size
39KB
-
Sample
241203-vrpfravmbz
-
MD5
73485207d11eb8be4890c2fe614ca19f
-
SHA1
8da62a34b0ad1ba1d76b80dd2814af75060ebe15
-
SHA256
160104171f76a625bac4aabf4fa99bc7a6c1c145786ff5bb98a949e40053fdeb
-
SHA512
e5286d2b2dd48e06ba480bb65f9d0328fa35f9d3cb56033c229fe755bc4a7bde33da9262c520e05a2b44347e966f3d8663300e1eac15ff2bac10508fe5375a1c
-
SSDEEP
768:lDy9l0kputAkzHxHW4MzSKZ0nVtSQAhncWa/HOgM4xDKpfEi72KK:lDhkE5RHW49ttWncWa/OgMYwl2KK
Behavioral task
behavioral1
Sample
Versal Client Beta.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Versal Client Beta.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
slipprz.duckdns.org:7214
-
Install_directory
%LocalAppData%
-
install_file
win32services.exe
Targets
-
-
Target
Versal Client Beta.exe
-
Size
68KB
-
MD5
3e7d64259b363be8f8d3ad5ce94943f4
-
SHA1
7e2fa2fb30069c3a7ce3f523440497d30ff6164f
-
SHA256
992fa7f194c76a9e6155a13ef849ae3fe55c3bd7954d3a08cff1719fdd16ae1b
-
SHA512
cadd51b55ad4ee21ed3c21bc462d034122fb5068c5bd8b82e61f2019c72d70c01f7c3892c916da6b89c39ba73ff9e65e6f52115fac3abc929796194008f0fca4
-
SSDEEP
1536:SDhdopFOmcMwSlUHbHzMiwO7EsxNbqFDAkIhQ+pnOhZ46+2dTR1:7OMjYbYiwv6NbqDXQnOPx+Y1
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1