General
-
Target
vu809e.lzh
-
Size
466KB
-
Sample
250120-m7zbwswndl
-
MD5
abff32a96bc509d0d39ccc9d17a618c4
-
SHA1
e45c928d9deea8b7272472b25641668eef56b2da
-
SHA256
7802d5ba1a55e070258c29be56b5cfada559cd462bf6ed5d6aa5804b06e46112
-
SHA512
cff280be0250cc331f4dfee8ec385c6c5c25bfd922854160c09eb1b7a4518e64129ae9c21e9ac341d291fdda5458618d88361a052472e9f2feebbf18058add80
-
SSDEEP
12288:gbal2FFtjAp91zHhjPLaR4rjEILdL9OcX1Yz:gGlmFKp/HpOKrH1Yz
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER TEU (NT250214).exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
dorismark81.duckdns.org:28503
j2oLPi6pecBOp0er
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
NEW ORDER TEU (NT250214).exe
-
Size
581KB
-
MD5
3c3b62520e40870390b33f528a8f7619
-
SHA1
c65f1ca358fcfbce3c1466bc47f3ed89c5d6d42a
-
SHA256
a2f9f0e73da837b578ef0b58a3bec4795920201b81d82cdb873e3a5198bddb96
-
SHA512
885aa492e0758099db0b631a3aa214a1cd81f42ffcd900b45293ea9a02fffd412b3fc2eb6579423a911335295d1726102b2381e4ce274e429f9193156de255a8
-
SSDEEP
12288:n5t6WhRSUunDYbDI13hVE+z5fOsQneDOYoPo4RNEnOef58U/isUkR:P6NnDMDIN5IwfnB7isT
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-