General
-
Target
Uzi - Virtualizer.exe
-
Size
1.5MB
-
Sample
250118-wlbhdazlas
-
MD5
19e10caeb8e008c60153b2b2a6702da1
-
SHA1
0919cc85e5a5a947ca6f335e6bc22f945f210e40
-
SHA256
1bbed9ce42fa9fc59da66af162fb7b5b13bfba8a197b8b81c32d780e3e6dab83
-
SHA512
c6c2eff95674ebb581dfedb383dbd551e5bb5db8e57302e3dd6ec8c122e73266d4cc779576dda57c17cbea87ead50039e418493788bcb3548a0d4834e6058616
-
SSDEEP
49152:ATg85+uqK7elPJFjvPmp8ke3oZg9yClEWpSCFLHypui:Ur5+lq6/jWp8ke3oZgYudLHy
Static task
static1
Behavioral task
behavioral1
Sample
Uzi - Virtualizer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Uzi - Virtualizer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
road-stars.gl.at.ply.gg:55299
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Targets
-
-
Target
Uzi - Virtualizer.exe
-
Size
1.5MB
-
MD5
19e10caeb8e008c60153b2b2a6702da1
-
SHA1
0919cc85e5a5a947ca6f335e6bc22f945f210e40
-
SHA256
1bbed9ce42fa9fc59da66af162fb7b5b13bfba8a197b8b81c32d780e3e6dab83
-
SHA512
c6c2eff95674ebb581dfedb383dbd551e5bb5db8e57302e3dd6ec8c122e73266d4cc779576dda57c17cbea87ead50039e418493788bcb3548a0d4834e6058616
-
SSDEEP
49152:ATg85+uqK7elPJFjvPmp8ke3oZg9yClEWpSCFLHypui:Ur5+lq6/jWp8ke3oZgYudLHy
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1