General
-
Target
Vxn Temp.exe
-
Size
227KB
-
Sample
241221-sk54tasjbp
-
MD5
113dc4a4b84b9e0665ef6628062c157a
-
SHA1
297f530f37ec6ddefb0ac724407c28fa2e143645
-
SHA256
71656a0cf08d272b202d567d10e893ad1f783e1f91c25986574a7bb9f5f10796
-
SHA512
654a35c3b21f37caafd1829bebdb79c6daeb62b969bca0e7b48338907938913e59bd66f5113def0756b284b83c09a04ca11eaeeb8c7ea68f322494d6264919c7
-
SSDEEP
3072:zy1E7PGcVUZMb0D1v42cZ4vv+aZ+LcsvIsMslafgr4ESvze7PGzl5J5:zyQU20RvM4f+LZIs86457h5L
Static task
static1
Malware Config
Extracted
xworm
side-sean.gl.at.ply.gg:37533
-
Install_directory
%ProgramData%
-
install_file
msedge.exe
Targets
-
-
Target
Vxn Temp.exe
-
Size
227KB
-
MD5
113dc4a4b84b9e0665ef6628062c157a
-
SHA1
297f530f37ec6ddefb0ac724407c28fa2e143645
-
SHA256
71656a0cf08d272b202d567d10e893ad1f783e1f91c25986574a7bb9f5f10796
-
SHA512
654a35c3b21f37caafd1829bebdb79c6daeb62b969bca0e7b48338907938913e59bd66f5113def0756b284b83c09a04ca11eaeeb8c7ea68f322494d6264919c7
-
SSDEEP
3072:zy1E7PGcVUZMb0D1v42cZ4vv+aZ+LcsvIsMslafgr4ESvze7PGzl5J5:zyQU20RvM4f+LZIs86457h5L
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-