General
-
Target
VEN HEX.exe
-
Size
2.1MB
-
Sample
250121-tpyqzasjfs
-
MD5
a697b45d558328d53b8f7c74268554f3
-
SHA1
430805b32e81d91994f33c2515ce79055433f9e2
-
SHA256
bbbd56026093c64936a368c723b12175330923741972d89c34699b77538d6e4c
-
SHA512
a1365c320abecc466bf3ca171ba0bfc75c477597b86268f825200fcf8255d430f189641b333002103dbe927960bbde75509636a7ca9224bd2ac503348874dc76
-
SSDEEP
49152:7e7JlfaddOPZc2gUpwUcDSBn9Iw+gGKRQ241PU:aTfkeBw3Y9Iw+gGK+1PU
Static task
static1
Behavioral task
behavioral1
Sample
VEN HEX.exe
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
shown-newspapers.gl.at.ply.gg:35343
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
VEN HEX.exe
-
Size
2.1MB
-
MD5
a697b45d558328d53b8f7c74268554f3
-
SHA1
430805b32e81d91994f33c2515ce79055433f9e2
-
SHA256
bbbd56026093c64936a368c723b12175330923741972d89c34699b77538d6e4c
-
SHA512
a1365c320abecc466bf3ca171ba0bfc75c477597b86268f825200fcf8255d430f189641b333002103dbe927960bbde75509636a7ca9224bd2ac503348874dc76
-
SSDEEP
49152:7e7JlfaddOPZc2gUpwUcDSBn9Iw+gGKRQ241PU:aTfkeBw3Y9Iw+gGK+1PU
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-