General
-
Target
Xworm 5.2.zip
-
Size
33.0MB
-
Sample
250117-vmm25axlht
-
MD5
59043b724d293c256219ebf504d7585d
-
SHA1
f0e7f97669840a24cc4540b1b6979ab38e87c896
-
SHA256
4573900c7704aebc47134753fc2e52d4b26a4f071f6cb76d7ddcd00e2b3f6331
-
SHA512
ee9ad2e8407aa4d5d63d3c10c862ae9aae8b5f652b0663d77f0229fd01238c1e13c807c87aa98321e5a1c180cd45da94fb1286bff34227bcd3b0aefa9cffa109
-
SSDEEP
786432:5wtNX23QgeyHmwthL9zcsV/gU9eKVGa8WzFvXCif1+u1OO8k76HU3QmMzS/BA:SX23QghFH9ISgU9n/82FSFlg6UAmMOG
Behavioral task
behavioral1
Sample
Xworm 5.2.zip
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
publication-portsmouth.gl.at.ply.gg:41961
O6yDyz0qQEiafOSy
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Xworm 5.2.zip
-
Size
33.0MB
-
MD5
59043b724d293c256219ebf504d7585d
-
SHA1
f0e7f97669840a24cc4540b1b6979ab38e87c896
-
SHA256
4573900c7704aebc47134753fc2e52d4b26a4f071f6cb76d7ddcd00e2b3f6331
-
SHA512
ee9ad2e8407aa4d5d63d3c10c862ae9aae8b5f652b0663d77f0229fd01238c1e13c807c87aa98321e5a1c180cd45da94fb1286bff34227bcd3b0aefa9cffa109
-
SSDEEP
786432:5wtNX23QgeyHmwthL9zcsV/gU9eKVGa8WzFvXCif1+u1OO8k76HU3QmMzS/BA:SX23QghFH9ISgU9n/82FSFlg6UAmMOG
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-