General
-
Target
8b9be5a7eb0b1f86eaa4cfd8f05d1b9c58c44e3fb6fc6197d62eb6091b700f94N.exe
-
Size
237KB
-
Sample
250117-m3s93strcx
-
MD5
5a303372ae38ee3c58fb5ebd3f278570
-
SHA1
2cf673823a7ae89f4234ad7de717908787fca42b
-
SHA256
8b9be5a7eb0b1f86eaa4cfd8f05d1b9c58c44e3fb6fc6197d62eb6091b700f94
-
SHA512
08f6c0ee3a2491e7cece32b46fe013cec140ee9d0a0f0412f6a5d4a7063cdcb9f0449c4ac98c8d513fdedf925ed90c1410243aa09410ff828db85b66fea83737
-
SSDEEP
3072:zr8WDrCMLUebnZ1AFO9KaL4NpVq8BxFRzaqF+o2GQJ7/JzqVfGv5fvpVQHGbTcW:PuM/bZ1AoLgVqwlL8pVRTcW
Behavioral task
behavioral1
Sample
8b9be5a7eb0b1f86eaa4cfd8f05d1b9c58c44e3fb6fc6197d62eb6091b700f94N.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
81.236.193.88:7000
f8terat.ddns.net:7000
-
Install_directory
%AppData%
-
install_file
chrome.exe
-
telegram
https://api.telegram.org/bot6494530798:AAEbPuClZKHOLS6zHwCLBQgZW7x00IaQ8x0/sendMessage?chat_id=5456205643
Targets
-
-
Target
8b9be5a7eb0b1f86eaa4cfd8f05d1b9c58c44e3fb6fc6197d62eb6091b700f94N.exe
-
Size
237KB
-
MD5
5a303372ae38ee3c58fb5ebd3f278570
-
SHA1
2cf673823a7ae89f4234ad7de717908787fca42b
-
SHA256
8b9be5a7eb0b1f86eaa4cfd8f05d1b9c58c44e3fb6fc6197d62eb6091b700f94
-
SHA512
08f6c0ee3a2491e7cece32b46fe013cec140ee9d0a0f0412f6a5d4a7063cdcb9f0449c4ac98c8d513fdedf925ed90c1410243aa09410ff828db85b66fea83737
-
SSDEEP
3072:zr8WDrCMLUebnZ1AFO9KaL4NpVq8BxFRzaqF+o2GQJ7/JzqVfGv5fvpVQHGbTcW:PuM/bZ1AoLgVqwlL8pVRTcW
-
Detect Xworm Payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1