General
-
Target
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe
-
Size
85KB
-
Sample
250121-t345xasphv
-
MD5
9fd2b5615fe45e09f52e280823633662
-
SHA1
55816fcadff841d76b00e5cd32869a586bdd7f8f
-
SHA256
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e
-
SHA512
b9170e95e2e2b0db7ff364840e8260eed8f37cf4f393cd3e661be9b4309ad44e5e0c891e2a026e84e8b605a9f1ecb805ed8a2e48cf2dd559306a86e34cd58a17
-
SSDEEP
1536:wgLOZCLbRcbwXpTpli0/eC/CiAQRbAwO4c06Qe6ulOfBIWZ65hUV6faFl:NLECL9cbIf6KRbAm6QelOffeLaFl
Behavioral task
behavioral1
Sample
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
asia-capabilities.gl.at.ply.gg:63098
-
Install_directory
%Temp%
-
install_file
Explorer.exe
Targets
-
-
Target
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e.exe
-
Size
85KB
-
MD5
9fd2b5615fe45e09f52e280823633662
-
SHA1
55816fcadff841d76b00e5cd32869a586bdd7f8f
-
SHA256
ea89146ad47697f8a4a55101c1df6968b0ecc247439ed3e9bb7c15eef54ae00e
-
SHA512
b9170e95e2e2b0db7ff364840e8260eed8f37cf4f393cd3e661be9b4309ad44e5e0c891e2a026e84e8b605a9f1ecb805ed8a2e48cf2dd559306a86e34cd58a17
-
SSDEEP
1536:wgLOZCLbRcbwXpTpli0/eC/CiAQRbAwO4c06Qe6ulOfBIWZ65hUV6faFl:NLECL9cbIf6KRbAm6QelOffeLaFl
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1