General
-
Target
NerestPC (1234).7z
-
Size
131KB
-
Sample
250121-aqsrkaxjap
-
MD5
53f566b0ecc482f4bf2692d2960aea56
-
SHA1
344eb55397ec0f359f7ff9ff447f32c3588a790b
-
SHA256
a9720210f921e58821c983337e8b8188b37695ded19ac4655eec223ee138638a
-
SHA512
6d2d5173b2caea7fb278ed7e3e3333e24462c159d40b4b9ca52b548ae9a987873823e97044bd7b6b29fbca8a011b7eec9f8d3f6f48bd854abcc78e3d50487b63
-
SSDEEP
3072:2F/dRKlhRmQxWAm8VEK+evHkbreYSZ6fqYvCYzV9Z/+35Bm:2FVwDRmx8VtHk3XgYvjzkO
Static task
static1
Behavioral task
behavioral1
Sample
NerestPC.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
early-doll.gl.at.ply.gg:17002
purpose-terror.gl.at.ply.gg:19882
-
Install_directory
%AppData%
-
install_file
java.exe
Targets
-
-
Target
NerestPC.exe
-
Size
5.0MB
-
MD5
36ce218e741638ecff00c9a8a4bafee4
-
SHA1
7a99e8d39c9fc5d6526a1230d68f08ce38007a8e
-
SHA256
0c94444657b966a20aabb6df5917cb801d5587a6d8948516f1c18254965047f8
-
SHA512
0aeff3cd96d3788d054e841f4335149c18337ac9e934ad8da90a27294d506aafc96c3527bc17baddc5d52ea4bef4a88308dd36859d40eda7d50bf2806ad2cb1d
-
SSDEEP
6144:F9A6JRlmHikG0dE74e1iAkfLPfglyunnoU8S+P2N3DrrFGP:MSKik2ke1iNglymC25DrrFG
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-