General
-
Target
New.exe
-
Size
39KB
-
Sample
250121-v6sfysvmc1
-
MD5
b4d443314462b4df0dc8b7c33085b0a2
-
SHA1
7aa1bd73ba5ca27d97f0c714fdd86cfdd887304b
-
SHA256
087f62458517a3fac322b3c8feb38959377bc1bbbee6174fbeb41b6c25a4499c
-
SHA512
3184a175f7219c1253ce2cfadda36e9d50b2845802419b60da84175cb41096c85bdbe265665558d76a723e7286a4b5f99aaacf2fef5200aa0bc925ea23f38733
-
SSDEEP
768:8vuzg/d8wQCu6v6hCuuJf27P1fFWPG9/a6OOwhYjmbF:dz68wNhwCuuJfUFv9/a6OOwGSJ
Behavioral task
behavioral1
Sample
New.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
46.146.46.81:7000:7000
46.146.46.81:7000
FaNJqzJhSyTDj5Pr
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
New.exe
-
Size
39KB
-
MD5
b4d443314462b4df0dc8b7c33085b0a2
-
SHA1
7aa1bd73ba5ca27d97f0c714fdd86cfdd887304b
-
SHA256
087f62458517a3fac322b3c8feb38959377bc1bbbee6174fbeb41b6c25a4499c
-
SHA512
3184a175f7219c1253ce2cfadda36e9d50b2845802419b60da84175cb41096c85bdbe265665558d76a723e7286a4b5f99aaacf2fef5200aa0bc925ea23f38733
-
SSDEEP
768:8vuzg/d8wQCu6v6hCuuJf27P1fFWPG9/a6OOwhYjmbF:dz68wNhwCuuJfUFv9/a6OOwGSJ
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1