General
-
Target
FIX.exe
-
Size
70KB
-
Sample
250119-wzl62azlbt
-
MD5
a4dcdcdfbb5ef68a0d9222618def90d2
-
SHA1
8a04a046642eb1ab4ed640995c550467a1463d9a
-
SHA256
95a032a1e79be0b8436651d2a8c3ff59253eb84c3972ac40ad39cb27fc5bb7f3
-
SHA512
fd11cf69a87b8ec19cc5fb6e01e86dcd40e308425cb43173faf812d331b1571e51ab7f75d50e8be725d177ad7c68517b390bb1a17622befe2f1cf70c402e6a65
-
SSDEEP
1536:DvKEG3MMvh0LPHlVKQWkxYJ+bLvGLip4WTs631n+OsB7qzjzqe3o:DvKEG3ML/KQZYJ+bLvRL+OsFIjOf
Malware Config
Extracted
xworm
exchange-syndicate.gl.at.ply.gg:22530
-
install_file
USB.exe
Targets
-
-
Target
FIX.exe
-
Size
70KB
-
MD5
a4dcdcdfbb5ef68a0d9222618def90d2
-
SHA1
8a04a046642eb1ab4ed640995c550467a1463d9a
-
SHA256
95a032a1e79be0b8436651d2a8c3ff59253eb84c3972ac40ad39cb27fc5bb7f3
-
SHA512
fd11cf69a87b8ec19cc5fb6e01e86dcd40e308425cb43173faf812d331b1571e51ab7f75d50e8be725d177ad7c68517b390bb1a17622befe2f1cf70c402e6a65
-
SSDEEP
1536:DvKEG3MMvh0LPHlVKQWkxYJ+bLvGLip4WTs631n+OsB7qzjzqe3o:DvKEG3ML/KQZYJ+bLvRL+OsFIjOf
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-