General
-
Target
Test7000.exe
-
Size
39KB
-
Sample
250121-v5yxcavmay
-
MD5
ec823d617d239ce10f01656b18c5d0e4
-
SHA1
8f17296536c4096ec178aeea963d620210e6d3d2
-
SHA256
fdc5bfbfef816556a6538fc3a59163a2ff77aedc3fc146285612067ce5cacdca
-
SHA512
635a8f2ae11899e91a7a46b5ec87ee5efab98878fe8b3fc22e9d8d20e7a3d88e0cd75ce190f1503ad1ac1c331944086b639e2657aabd55055e6fe3dc7eed2bf1
-
SSDEEP
768:yftYec/H/fCfTvQ5hxx3CAFWPG9EW6OOwhWQmO6i:yftYecXKf2RFv9EW6OOwY5Od
Behavioral task
behavioral1
Sample
Test7000.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
BFonurWjZ07Ruqo3
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/F9G6bgDh
Targets
-
-
Target
Test7000.exe
-
Size
39KB
-
MD5
ec823d617d239ce10f01656b18c5d0e4
-
SHA1
8f17296536c4096ec178aeea963d620210e6d3d2
-
SHA256
fdc5bfbfef816556a6538fc3a59163a2ff77aedc3fc146285612067ce5cacdca
-
SHA512
635a8f2ae11899e91a7a46b5ec87ee5efab98878fe8b3fc22e9d8d20e7a3d88e0cd75ce190f1503ad1ac1c331944086b639e2657aabd55055e6fe3dc7eed2bf1
-
SSDEEP
768:yftYec/H/fCfTvQ5hxx3CAFWPG9EW6OOwhWQmO6i:yftYecXKf2RFv9EW6OOwY5Od
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1