General
-
Target
9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982
-
Size
1.9MB
-
Sample
241205-lwebxavnhk
-
MD5
0fa0f690b52cbae6bc8ebbe14f3c3e18
-
SHA1
9ddef8fe6dd6ebb967d2013d8f922da6bd7f32a7
-
SHA256
9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982
-
SHA512
72a7868f4c9febb29e9cd58669d71840d01066120134dff18536e3049d1ed2b72449a871ac63f838f2dd8d98ad43568a2b54a4669d2ff4f821f346547eff5b82
-
SSDEEP
49152:1cAik7bXfOK/h8ouCv7NNKD19hCi1aD8K95Zvwe:aABvOK/hzNNMkOaD8KtZ
Static task
static1
Behavioral task
behavioral1
Sample
9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
vpss.ddns.net:1245
indic.serveftp.com:1245
ZlxMvmg7wbh8VVle
-
Install_directory
%AppData%
-
install_file
Process for Setting Synchronization .exe
-
telegram
https://api.telegram.org/bot6089519915:AAF7fGsNdxVbpoG7s96nf2ioIN27LQpQuh8/sendMessage?chat_id=597592591
Targets
-
-
Target
9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982
-
Size
1.9MB
-
MD5
0fa0f690b52cbae6bc8ebbe14f3c3e18
-
SHA1
9ddef8fe6dd6ebb967d2013d8f922da6bd7f32a7
-
SHA256
9a34f0fec4bab7739f220dab713d8bca30c5cb72e9755a2ddbb32077b076c982
-
SHA512
72a7868f4c9febb29e9cd58669d71840d01066120134dff18536e3049d1ed2b72449a871ac63f838f2dd8d98ad43568a2b54a4669d2ff4f821f346547eff5b82
-
SSDEEP
49152:1cAik7bXfOK/h8ouCv7NNKD19hCi1aD8K95Zvwe:aABvOK/hzNNMkOaD8KtZ
-
Detect Xworm Payload
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1