General
-
Target
Test.exe
-
Size
35KB
-
Sample
250118-zyfveavram
-
MD5
74205cedc0e8cc066cd983960d7a468f
-
SHA1
146990b7b4ccf7b3ea747b043397a80a8db3e60c
-
SHA256
3013b5ecd8ed141120e775874964273c7edbe30cd5b47fd0a276e730e7f973ef
-
SHA512
979b24371ba77f7241e412ca2154244e063a4e2896eeae23e7b3df0c465fc42538c507bc7e0634012601600a5cda675b2ef9dbb971f64564f56df0226612f1b8
-
SSDEEP
768:UDMfF7zLKYs2Byj57uddqL79Fk9wmO/h2/22L:UkF7HKYs/1Ed0Fk9wmO/Au2L
Behavioral task
behavioral1
Sample
Test.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
ensure-manual.gl.at.ply.gg:9321
uQwGzMlYjddKytmr
-
Install_directory
%AppData%
-
install_file
dllhost.exe
Targets
-
-
Target
Test.exe
-
Size
35KB
-
MD5
74205cedc0e8cc066cd983960d7a468f
-
SHA1
146990b7b4ccf7b3ea747b043397a80a8db3e60c
-
SHA256
3013b5ecd8ed141120e775874964273c7edbe30cd5b47fd0a276e730e7f973ef
-
SHA512
979b24371ba77f7241e412ca2154244e063a4e2896eeae23e7b3df0c465fc42538c507bc7e0634012601600a5cda675b2ef9dbb971f64564f56df0226612f1b8
-
SSDEEP
768:UDMfF7zLKYs2Byj57uddqL79Fk9wmO/h2/22L:UkF7HKYs/1Ed0Fk9wmO/Au2L
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1