General
-
Target
0a6b6f9b9cbf8a15660c1d5472f620a16aedc318041c00d59bedf220e697e408N.exe
-
Size
85KB
-
Sample
250121-cyz7qa1rez
-
MD5
70447dbf18d9dc8426a9900ad6c28700
-
SHA1
ce72e3dafd211af37ee84c07850ecf4b126fdee8
-
SHA256
0a6b6f9b9cbf8a15660c1d5472f620a16aedc318041c00d59bedf220e697e408
-
SHA512
87c41914eb2297fc510c65a54957abdead439a1b42cb3a3d1593474d3d3e8a42e42e8341521e12e60fdd0385243dfcb48422e0d84e32d417e08249c963fd58ce
-
SSDEEP
1536:wgLOZCLbRcbwXpTpli0/eC/CiAQRbAwO4c06Qe6ulOfBIWZ65hUV6faF:NLECL9cbIf6KRbAm6QelOffeLaF
Behavioral task
behavioral1
Sample
0a6b6f9b9cbf8a15660c1d5472f620a16aedc318041c00d59bedf220e697e408N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0a6b6f9b9cbf8a15660c1d5472f620a16aedc318041c00d59bedf220e697e408N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
asia-capabilities.gl.at.ply.gg:63098
-
Install_directory
%Temp%
-
install_file
Explorer.exe
Targets
-
-
Target
0a6b6f9b9cbf8a15660c1d5472f620a16aedc318041c00d59bedf220e697e408N.exe
-
Size
85KB
-
MD5
70447dbf18d9dc8426a9900ad6c28700
-
SHA1
ce72e3dafd211af37ee84c07850ecf4b126fdee8
-
SHA256
0a6b6f9b9cbf8a15660c1d5472f620a16aedc318041c00d59bedf220e697e408
-
SHA512
87c41914eb2297fc510c65a54957abdead439a1b42cb3a3d1593474d3d3e8a42e42e8341521e12e60fdd0385243dfcb48422e0d84e32d417e08249c963fd58ce
-
SSDEEP
1536:wgLOZCLbRcbwXpTpli0/eC/CiAQRbAwO4c06Qe6ulOfBIWZ65hUV6faF:NLECL9cbIf6KRbAm6QelOffeLaF
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1