General
-
Target
roblox multitool.exe
-
Size
83KB
-
Sample
250121-kljm7svrgq
-
MD5
cb0546adb41f324fcacb08df0f6ea3c0
-
SHA1
6c1cc4d746858e4ed050f83583e5f882af76b346
-
SHA256
6ff48a0d7a47aa76f223ae272eb73caa5a8cf343a4e1a165a30017b20511d317
-
SHA512
a6927e5ec4efc4d02927af38e1c2aed95f8f6350dcc37146257f31cf98786b156035d136c43969b359c7a3e9edcb16504f24be28d229a73fa0cda782c8c52888
-
SSDEEP
1536:KmA2x/2kxoQkhGxN6Qsv0HokBXkU69bWioLJpJnCilB6KxyknLKqO5tzKH2K5n+W:Km/610CsIyS9bWioTIGTEamqO5gH2O+W
Behavioral task
behavioral1
Sample
roblox multitool.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
roblox multitool.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
blood-pattern.gl.at.ply.gg:24558
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7704029346:AAHPre1lXQa0UfPCpOUXJZ9UXA9mFxvH4Gk/sendMessage?chat_id=7590668020
Targets
-
-
Target
roblox multitool.exe
-
Size
83KB
-
MD5
cb0546adb41f324fcacb08df0f6ea3c0
-
SHA1
6c1cc4d746858e4ed050f83583e5f882af76b346
-
SHA256
6ff48a0d7a47aa76f223ae272eb73caa5a8cf343a4e1a165a30017b20511d317
-
SHA512
a6927e5ec4efc4d02927af38e1c2aed95f8f6350dcc37146257f31cf98786b156035d136c43969b359c7a3e9edcb16504f24be28d229a73fa0cda782c8c52888
-
SSDEEP
1536:KmA2x/2kxoQkhGxN6Qsv0HokBXkU69bWioLJpJnCilB6KxyknLKqO5tzKH2K5n+W:Km/610CsIyS9bWioTIGTEamqO5gH2O+W
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1