General
-
Target
fXWlfxf.exe
-
Size
270KB
-
Sample
250121-zg4j5szqbl
-
MD5
b08e25b2e7527dd37baa4352cf143f81
-
SHA1
5da381243e460e32388f1f0f33988e98ff3cc38f
-
SHA256
5d3f76dc4c4191ac7baa3ba130abdce26bef47962e7c33645e0a30dd6635eeab
-
SHA512
2083a53f24c6061cfd6de5b486fe8794730ec964615e8e2dc009e1d5b0de8880f0f8bdb915c860bd79a34f0e8e4b76abc3aea10e36f36b4cabd1a93db1e27853
-
SSDEEP
3072:+qom4DMrhHWjYyEH4SeeSy7ZCyRlhGSrt1QEiaZiPm2s1P783FzHkAnOfGPxwq6T:+qomfYSerypDGSB1sqq6Ys0M
Static task
static1
Behavioral task
behavioral1
Sample
fXWlfxf.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
83.151.14.2:9572
qzYg48lemddFwWYK
-
install_file
USB.exe
Targets
-
-
Target
fXWlfxf.exe
-
Size
270KB
-
MD5
b08e25b2e7527dd37baa4352cf143f81
-
SHA1
5da381243e460e32388f1f0f33988e98ff3cc38f
-
SHA256
5d3f76dc4c4191ac7baa3ba130abdce26bef47962e7c33645e0a30dd6635eeab
-
SHA512
2083a53f24c6061cfd6de5b486fe8794730ec964615e8e2dc009e1d5b0de8880f0f8bdb915c860bd79a34f0e8e4b76abc3aea10e36f36b4cabd1a93db1e27853
-
SSDEEP
3072:+qom4DMrhHWjYyEH4SeeSy7ZCyRlhGSrt1QEiaZiPm2s1P783FzHkAnOfGPxwq6T:+qomfYSerypDGSB1sqq6Ys0M
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-