General
-
Target
Internal.vmp.exe
-
Size
71KB
-
Sample
250120-lema7aspdp
-
MD5
58559a2f3b00bd938dd1f26a8fdf0e7c
-
SHA1
6a07c99804295019e52eb4b3fcac0560f8a9acf2
-
SHA256
e860a3c718b864a28f858b63b4418b45e93bd238fae19e8da8224c410e9eb772
-
SHA512
c9cd1129163c6146b4238d917b8b150c5498bc01ed2304f6c099702e7e333853f447162f5ca723db33a08b082861703379b829b7a099cc1e52444b56bfac0d19
-
SSDEEP
1536:3RE/PlVX7qHW83cPkCCSbBUFOXuUccI6kuq9QOmYlyy:3REVV0W8sPPCSbBUIXdOTMy
Behavioral task
behavioral1
Sample
Internal.vmp.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:47599
147.185.221.23:47599
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
Internal.vmp.exe
-
Size
71KB
-
MD5
58559a2f3b00bd938dd1f26a8fdf0e7c
-
SHA1
6a07c99804295019e52eb4b3fcac0560f8a9acf2
-
SHA256
e860a3c718b864a28f858b63b4418b45e93bd238fae19e8da8224c410e9eb772
-
SHA512
c9cd1129163c6146b4238d917b8b150c5498bc01ed2304f6c099702e7e333853f447162f5ca723db33a08b082861703379b829b7a099cc1e52444b56bfac0d19
-
SSDEEP
1536:3RE/PlVX7qHW83cPkCCSbBUFOXuUccI6kuq9QOmYlyy:3REVV0W8sPPCSbBUIXdOTMy
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1