General
-
Target
2025-01-17-13-06-51.exe
-
Size
77KB
-
Sample
250118-zk4pbatnfz
-
MD5
e2b82b4f39f2527e850756664e5462a1
-
SHA1
8de7c878e724e1667cc90f3fad7b109f5ed65927
-
SHA256
e41f276291b01717c78ffe3d6a288bf95b42da33445c0c8490e0b546fe380935
-
SHA512
5cb25a33e937febb5f8255e2a80eaa1fccc4b5f6442e831d47839ba896727b85e139af5195c46957187b422c7f010f2349320ef977d4598f4b26f8ca2d573a82
-
SSDEEP
1536:0042Bt3U61POAeecviUOeWHiMbKNQpxjNG68MPMKORGAkTxdw9:IoNU61PO6cvrFWvbKQKrKORkTw9
Behavioral task
behavioral1
Sample
2025-01-17-13-06-51.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
trip-thesaurus.gl.at.ply.gg:16715
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
2025-01-17-13-06-51.exe
-
Size
77KB
-
MD5
e2b82b4f39f2527e850756664e5462a1
-
SHA1
8de7c878e724e1667cc90f3fad7b109f5ed65927
-
SHA256
e41f276291b01717c78ffe3d6a288bf95b42da33445c0c8490e0b546fe380935
-
SHA512
5cb25a33e937febb5f8255e2a80eaa1fccc4b5f6442e831d47839ba896727b85e139af5195c46957187b422c7f010f2349320ef977d4598f4b26f8ca2d573a82
-
SSDEEP
1536:0042Bt3U61POAeecviUOeWHiMbKNQpxjNG68MPMKORGAkTxdw9:IoNU61PO6cvrFWvbKQKrKORkTw9
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-