General
-
Target
33333.exe
-
Size
90KB
-
Sample
250119-gckblayjgp
-
MD5
e10791416cbe4bd094d22476f1e0d067
-
SHA1
9e86515eb7e5b3fd7adfc52db9508adc61c29cd8
-
SHA256
54a6342541cb80a9e801ce48de755ab5dfb1931e2afdf9ae55714f502c9b09e4
-
SHA512
34cdc3c5f152dc27e1ff07311264fcebb250e8125d3a4cf7a02797a16bb48dea4ecfc3de88d46a439481ca80d54fe5f0e4964206a5a00bf665a0bdeac5df9e9b
-
SSDEEP
1536:K+yL5gAxHwKKXHWsjTv5RHWvcbJMP7CesjBD6DrWWmPOrVYTSdBc:el9OWs3WkbJsTs+CPOrVWuc
Behavioral task
behavioral1
Sample
33333.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
virtual-pointed.gl.at.ply.gg:17000
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
33333.exe
-
Size
90KB
-
MD5
e10791416cbe4bd094d22476f1e0d067
-
SHA1
9e86515eb7e5b3fd7adfc52db9508adc61c29cd8
-
SHA256
54a6342541cb80a9e801ce48de755ab5dfb1931e2afdf9ae55714f502c9b09e4
-
SHA512
34cdc3c5f152dc27e1ff07311264fcebb250e8125d3a4cf7a02797a16bb48dea4ecfc3de88d46a439481ca80d54fe5f0e4964206a5a00bf665a0bdeac5df9e9b
-
SSDEEP
1536:K+yL5gAxHwKKXHWsjTv5RHWvcbJMP7CesjBD6DrWWmPOrVYTSdBc:el9OWs3WkbJsTs+CPOrVWuc
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1