General
-
Target
XWorm.rar
-
Size
15.2MB
-
Sample
250118-2hapkaxkbt
-
MD5
b96de2151ce220f772ff79077da7930e
-
SHA1
536b4e92e8fdb32da92b4e1d720c9312528c18c9
-
SHA256
53c02ff543f5ebbf596f707a1a1feaade8c743eceb22d050d34c31d15d7a0ba1
-
SHA512
5092fc68bbd7743d7f7f4ac5dab84db30b5f4f25002947db5d9f8b19dcc2df483b1f48a29f7f9bfa9a3ceddf83f54263ee6eb7f6dca21229bf5b9a97f39b9073
-
SSDEEP
393216:lyatTe39n3198f0xuUdHHGh9Ys6TSBc36PzRhn88LMkV:lyL3hH8fMlZ+W+BcqPzRhSkV
Behavioral task
behavioral1
Sample
XWorm/XWorm 5.6.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
XWorm/XWorm 5.6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:55967
ca-assessing.gl.at.ply.gg:55967
0VAbVWRVWwPHtkmk
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
XWorm/XWorm 5.6.exe
-
Size
40KB
-
MD5
496c3225443deab6949914cd224046f4
-
SHA1
18b75bbac53042d66ccddb565e3a5a8547cc563f
-
SHA256
875d88c284b312b7858c2fd2b683036c16f9f914bce35ca8fa87ccfb2db202be
-
SHA512
2d7c2436244bd5d5908cdae5ec7dae1ef10eae421204c48dfcce77162d0b8a3fb90a6a9acfc9a310d30b241b62b0e79a7464503fff873cf73f331b8d20bd9dec
-
SSDEEP
768:CNZ4ZV7QMND9Pf7PnDPItE9/JF5Py9Ovzf6SOMhS33iP:My7Qo1TPnDP5xFs9C76SOMIW
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-