General
-
Target
XWorm_V5.6.rar
-
Size
22.9MB
-
Sample
241221-nv9sjaypay
-
MD5
3242b099c25cfa620a197bbe3c18e323
-
SHA1
92b2b66bb55b0aedaf6fdbee0977f0b383c85108
-
SHA256
0ea39ad1a4a162efdfd1aeeb734603c2049fb91bd736907266e0e9d49f6030be
-
SHA512
c7d9c8675ea09f64a22cb94d6cde6e164a06f176b4c2d64d3da1fe725e1d60d57d43951eaa63789eddfb34739aab46c76834cd80063d3ecfb94266db3671e146
-
SSDEEP
393216:DxcLoXUnYnrdLVsgP5JgQ0DJYxvx6N2Etg8j7c3nl7LuRI:rEnurdSgcQ0DJ+LEqh3nlnF
Behavioral task
behavioral1
Sample
XWorm V5.6/Xworm.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
MXofXDDvLooD2jWq
-
install_file
USB.exe
Targets
-
-
Target
XWorm V5.6/Xworm.exe
-
Size
8.1MB
-
MD5
09a9589689f2e0f5697d413cca4e227b
-
SHA1
2cb33d48a4b39c9304cbd8395a9a89074f8c14e2
-
SHA256
d0a2637c7f1fe073e613d607da3ada027123c75194ebdf528734d8b48e808a8d
-
SHA512
2c2494736c9fcd1a3d3b10e77c1af1ad60595d82897f7d82236f64b51d8bb46d8d723764fded8b3d94c68c43beb9c9e0c4c4a9c1d09603b46d56011f13b8e62f
-
SSDEEP
196608:wQJFUQqPn9x5pJPU/Vp4uDubMUxOQZyl5pFfeYUkZV:PMF9JPUtp4uDubMc1ZylRf5
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-