General
-
Target
Steam.exe
-
Size
333KB
-
Sample
241231-wqn92avlcl
-
MD5
b15941b7edb0a49db4c1a58c9ee1019d
-
SHA1
179f337350d990e4329f3700d65fbecadcc9e326
-
SHA256
77047b904717fdd6f280cb57d5707c35a9d4ff6e85087b2e19e5965cd1dd2967
-
SHA512
bee9e86cf7f9a97fbb489b695f259b23f1242621a39d3461a7967b2e37cf00c2eae2d4f94b3c108dd12e530bca24d90b377a4a4f62f4dae855fc9f285b4b6464
-
SSDEEP
6144:PwMbfBGh7p+Y+GIIIIIIIhIIIIIIIIIIIIIIIU:PwbQ7
Behavioral task
behavioral1
Sample
Steam.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
xworm
127.0.0.1:4546
photos-perth.gl.at.ply.gg 127.0.0.1:4546:4546
-
Install_directory
%AppData%
-
install_file
svhost.exe
Targets
-
-
Target
Steam.exe
-
Size
333KB
-
MD5
b15941b7edb0a49db4c1a58c9ee1019d
-
SHA1
179f337350d990e4329f3700d65fbecadcc9e326
-
SHA256
77047b904717fdd6f280cb57d5707c35a9d4ff6e85087b2e19e5965cd1dd2967
-
SHA512
bee9e86cf7f9a97fbb489b695f259b23f1242621a39d3461a7967b2e37cf00c2eae2d4f94b3c108dd12e530bca24d90b377a4a4f62f4dae855fc9f285b4b6464
-
SSDEEP
6144:PwMbfBGh7p+Y+GIIIIIIIhIIIIIIIIIIIIIIIU:PwbQ7
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-