General
-
Target
5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09N.exe
-
Size
49KB
-
Sample
250120-n3grqaxpft
-
MD5
4e5ba87d709a29a1d916192cf460de70
-
SHA1
79acd66d658dcb635d994fb8c135455abc0f69f8
-
SHA256
5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09
-
SHA512
88a41839d9933b495be4e1da46b05d7cb20d8207b2ed615af1f8a88a2c005e0094ff1ad5fbd81191ee8f191b2e432b0b457d3d8107d9f347bd06e59a339da353
-
SSDEEP
1536:G4TlXi94kgMLEhNkoyIWwClDVC9D2XPs9H:F5Xz3MYuwV9QPsZ
Static task
static1
Behavioral task
behavioral1
Sample
5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09N.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
WDJjJwZM6N0epwZX
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09N.exe
-
Size
49KB
-
MD5
4e5ba87d709a29a1d916192cf460de70
-
SHA1
79acd66d658dcb635d994fb8c135455abc0f69f8
-
SHA256
5d23561aa4fb0eea26e365b79c09c503643877fe4084647f99132c8b4a425c09
-
SHA512
88a41839d9933b495be4e1da46b05d7cb20d8207b2ed615af1f8a88a2c005e0094ff1ad5fbd81191ee8f191b2e432b0b457d3d8107d9f347bd06e59a339da353
-
SSDEEP
1536:G4TlXi94kgMLEhNkoyIWwClDVC9D2XPs9H:F5Xz3MYuwV9QPsZ
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-