General
-
Target
loader.exe
-
Size
2.6MB
-
Sample
250118-yqndvasmfx
-
MD5
2b45969ccbd973f5bc6a10716093e00b
-
SHA1
596467ce3d6a3a3a80abaca3b8df30a52c95ccab
-
SHA256
fea9620c907c32bef37b6e5a08699eae88ecc0ee014e52495a39a46312d4766f
-
SHA512
b985d5a73027e07519d8f180b6b87e1b95f6a5185dc279db783f3c6f5e788b0bb9279f74bd4bb1a52fb766970d34a0e2a3a67446fd825f70d68981ef77264578
-
SSDEEP
49152:Uhsk/i2lNbPzoc9MmJdW8zo7UqT31p+/JLD9bC8N1FIZfIUzon0KW6My0+:gni2lRoNYo7DT3m/JL5bCCEbo0KW6
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
185.94.29.228:4444
-
Install_directory
%Temp%
-
install_file
Spotify.exe
Targets
-
-
Target
loader.exe
-
Size
2.6MB
-
MD5
2b45969ccbd973f5bc6a10716093e00b
-
SHA1
596467ce3d6a3a3a80abaca3b8df30a52c95ccab
-
SHA256
fea9620c907c32bef37b6e5a08699eae88ecc0ee014e52495a39a46312d4766f
-
SHA512
b985d5a73027e07519d8f180b6b87e1b95f6a5185dc279db783f3c6f5e788b0bb9279f74bd4bb1a52fb766970d34a0e2a3a67446fd825f70d68981ef77264578
-
SSDEEP
49152:Uhsk/i2lNbPzoc9MmJdW8zo7UqT31p+/JLD9bC8N1FIZfIUzon0KW6My0+:gni2lRoNYo7DT3m/JL5bCCEbo0KW6
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-