General
-
Target
fixerformultitool.exe
-
Size
79KB
-
Sample
250120-y1mv3axjhj
-
MD5
2f7fb28cf91e8ccb2257834f9136cfd6
-
SHA1
b8f0f86c33bf46a8af745caf4bc0a8d5878e75f1
-
SHA256
014f0079149caead324ea0d3adb18d65f607662b8725da7fec7628de4acf828f
-
SHA512
4e0b8e0268346ddcd5c23d34c8c556eef66994d8c01f06bb5bd19cf1c25f00ee76ad8d0e1edb012ed64ba86a63cbcdb806595cc7d9dfc8ef4d31a4b6ef99c236
-
SSDEEP
1536:KPlF7XxO2o6rx59bm1AXR8x8KG6GaOD2srtdn+6:KrXcID9bm1k9KHOD2sr/+6
Behavioral task
behavioral1
Sample
fixerformultitool.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fixerformultitool.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
bad-motor.gl.at.ply.gg:4444
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7704029346:AAHPre1lXQa0UfPCpOUXJZ9UXA9mFxvH4Gk/sendMessage?chat_id=7590668020
Targets
-
-
Target
fixerformultitool.exe
-
Size
79KB
-
MD5
2f7fb28cf91e8ccb2257834f9136cfd6
-
SHA1
b8f0f86c33bf46a8af745caf4bc0a8d5878e75f1
-
SHA256
014f0079149caead324ea0d3adb18d65f607662b8725da7fec7628de4acf828f
-
SHA512
4e0b8e0268346ddcd5c23d34c8c556eef66994d8c01f06bb5bd19cf1c25f00ee76ad8d0e1edb012ed64ba86a63cbcdb806595cc7d9dfc8ef4d31a4b6ef99c236
-
SSDEEP
1536:KPlF7XxO2o6rx59bm1AXR8x8KG6GaOD2srtdn+6:KrXcID9bm1k9KHOD2sr/+6
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1