General
-
Target
Solara_Update.exe
-
Size
234KB
-
Sample
250119-qlmyhsypew
-
MD5
d1e76f6454d97b1b4bb21980abd9fc98
-
SHA1
03b224f0f11e3768f8c62fa02dde36a17aeb4a6a
-
SHA256
d3ad612b70e6d6cfcf75d28132d9d85e47579b532002e13f17acd597f13bc6a3
-
SHA512
70153899ae2ef5f0c9f2240cf3ae9f6d30921f2a27014dccf24883273caf9f1c1769f8992c23357e5dc460e243956a0949660d0ea96368518a2613c8651145fe
-
SSDEEP
6144:BzcIVyx+bmCmh/5iJbb2q7eGD6sGuS1j:BgV4mhIaqKc6L1j
Behavioral task
behavioral1
Sample
Solara_Update.exe
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
127.0.0.1:22078
allows-announces.gl.at.ply.gg:22078
-
Install_directory
%AppData%
-
install_file
Solara_Update.exe
Targets
-
-
Target
Solara_Update.exe
-
Size
234KB
-
MD5
d1e76f6454d97b1b4bb21980abd9fc98
-
SHA1
03b224f0f11e3768f8c62fa02dde36a17aeb4a6a
-
SHA256
d3ad612b70e6d6cfcf75d28132d9d85e47579b532002e13f17acd597f13bc6a3
-
SHA512
70153899ae2ef5f0c9f2240cf3ae9f6d30921f2a27014dccf24883273caf9f1c1769f8992c23357e5dc460e243956a0949660d0ea96368518a2613c8651145fe
-
SSDEEP
6144:BzcIVyx+bmCmh/5iJbb2q7eGD6sGuS1j:BgV4mhIaqKc6L1j
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-