General
-
Target
691f6e3c-9102-4b60-a878-346573162d06.tmp
-
Size
24.6MB
-
Sample
250119-xqc3fa1rgm
-
MD5
a083ae48ef54dd491872b9da1383730c
-
SHA1
6c00f38f5e033273275e36c77a40955caa190a80
-
SHA256
271beba7b37bad8ceb9b40f95ca7ac8076ff1c1670bc04825e78b0647ab25bbd
-
SHA512
7c843395838afadc565705c3b6ee22f1dbc66ef6fbe195f9050a08936ba661425b9f9cb44adf91ef347b1d1481cfb11de9fed99f4132d30333c75a337b3146eb
-
SSDEEP
786432:/3mbQPobZvANWHOR4YdRSbKZ+fnTkQfSzy:/3SoWuDjSpbZH
Static task
static1
Behavioral task
behavioral1
Sample
691f6e3c-9102-4b60-a878-346573162d06.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
tranny.racoongang.com:3389
174.89.155.190:3389
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
691f6e3c-9102-4b60-a878-346573162d06.tmp
-
Size
24.6MB
-
MD5
a083ae48ef54dd491872b9da1383730c
-
SHA1
6c00f38f5e033273275e36c77a40955caa190a80
-
SHA256
271beba7b37bad8ceb9b40f95ca7ac8076ff1c1670bc04825e78b0647ab25bbd
-
SHA512
7c843395838afadc565705c3b6ee22f1dbc66ef6fbe195f9050a08936ba661425b9f9cb44adf91ef347b1d1481cfb11de9fed99f4132d30333c75a337b3146eb
-
SSDEEP
786432:/3mbQPobZvANWHOR4YdRSbKZ+fnTkQfSzy:/3SoWuDjSpbZH
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1