General
-
Target
eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe
-
Size
2.8MB
-
Sample
241204-ege7bswmam
-
MD5
abd473026ff01a89544052f0b7a437f0
-
SHA1
114aa2653ad093ca5964a798333407eaa5e2a35b
-
SHA256
eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783
-
SHA512
3156af297e868ddf200efb1e8334959755ba6563447510472699ad282ad3503c04060d6faf0b6c4c429e8b71bf60fb7015c4e720df18360107ad5489126b8a21
-
SSDEEP
49152:95VWQ4h1EtbHYF4PGVHX9gWX9cPpmnUr+Syx+UQ498iEjEv/6p3BVR5:9FjtbO4PCtDKpohbx+b4aHA/QHr
Behavioral task
behavioral1
Sample
eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
canada-nervous.gl.at.ply.gg:26681
-
Install_directory
%AppData%
-
install_file
scvhost.exe
-
telegram
https://api.telegram.org/bot7556258236:AAFbbPTNmGub8pdNz3R3W7xxukN43pvt5Tc/sendMessage?chat_id=7191221522
Targets
-
-
Target
eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783N.exe
-
Size
2.8MB
-
MD5
abd473026ff01a89544052f0b7a437f0
-
SHA1
114aa2653ad093ca5964a798333407eaa5e2a35b
-
SHA256
eb08d774bc4adf5cbba803b4a97757b0281402bdb5b270d621e7705fcc0ec783
-
SHA512
3156af297e868ddf200efb1e8334959755ba6563447510472699ad282ad3503c04060d6faf0b6c4c429e8b71bf60fb7015c4e720df18360107ad5489126b8a21
-
SSDEEP
49152:95VWQ4h1EtbHYF4PGVHX9gWX9cPpmnUr+Syx+UQ498iEjEv/6p3BVR5:9FjtbO4PCtDKpohbx+b4aHA/QHr
-
Detect Xworm Payload
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1