General
-
Target
NeverloseCrack (infected).zip
-
Size
39KB
-
Sample
250121-ap2yvawrhw
-
MD5
269009b51d321a9d821a5b2e7b0fd444
-
SHA1
c60443ae8cb2162ace9af6d8c3bc3e63ce1ac3df
-
SHA256
c6ee0fd2b511f01ced2be0cd78d5751886e2f1540d39981238ca3d48cd750bca
-
SHA512
09afa04d4bff4df60295f961803aadaff43539b7b85df8f063e97c247022a6cc0632b0ff57c1b5cafbdb55198a892d22abb727e2524c582d33b4e4ce7e39534d
-
SSDEEP
768:x8o9UOrxTUoO0lJFotq2TK7wxE0ISLr8/LeMgug8pmdIsX/6l3:yo9U+xmze7wxE9Z/LePug5dTPc3
Behavioral task
behavioral1
Sample
OOKetNUn.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:2501
local-josh.gl.at.ply.gg:2501
-
Install_directory
%AppData%
-
install_file
Expencive.exe
Targets
-
-
Target
OOKetNUn.exe
-
Size
69KB
-
MD5
5181770cbed31b900c8af62fd4239dd4
-
SHA1
a60ecfce32371fe5bf5ace4f6d85da2c2075738e
-
SHA256
6fcde9493755059859d02694b87be5a0c22e34402604c599a405cb81641a32c8
-
SHA512
62bf6dbf4e9bcc98978371b8d0d8fe0bf66c7ffa9fbb4a20d948bd85d30da98dbd7bfb496abe5882857232af83fa404bc8c6e0f1cacbe3fba11a7a734dbff292
-
SSDEEP
1536:SXEBFv+KnZS1fhCte+bQWRjg6ETKZOWbhQu4:ZnU15CQ+bQij+TKZOWbh74
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-