General
-
Target
SPOOFER TREY.exe
-
Size
76KB
-
Sample
250122-k52m5aynhv
-
MD5
fff2d0ea19905c9a8f6c6fca38f64b15
-
SHA1
deb5dec4ca7de9ba0795f441ccda2683317341a9
-
SHA256
8fd825863687566693df92add60bc259abe5436238e8b99369fad09b17aa5aaf
-
SHA512
aa8f6e5cb2e2fdc505ffa67246bd5539d853c2a22221911a7f2bb84749d11b10a29fbf7fb9d5244a84d082c5f387a5861c34b71e96f57b720a34c6216d8f1558
-
SSDEEP
1536:ho2cR9MCrmWPDjC0hIgQLCap5BzGd0B/JUT4l7A9EkNof:2hCuF7aftGO3Tc+f
Static task
static1
Behavioral task
behavioral1
Sample
SPOOFER TREY.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
exchange-syndicate.gl.at.ply.gg:22530
-
install_file
USB.exe
Targets
-
-
Target
SPOOFER TREY.exe
-
Size
76KB
-
MD5
fff2d0ea19905c9a8f6c6fca38f64b15
-
SHA1
deb5dec4ca7de9ba0795f441ccda2683317341a9
-
SHA256
8fd825863687566693df92add60bc259abe5436238e8b99369fad09b17aa5aaf
-
SHA512
aa8f6e5cb2e2fdc505ffa67246bd5539d853c2a22221911a7f2bb84749d11b10a29fbf7fb9d5244a84d082c5f387a5861c34b71e96f57b720a34c6216d8f1558
-
SSDEEP
1536:ho2cR9MCrmWPDjC0hIgQLCap5BzGd0B/JUT4l7A9EkNof:2hCuF7aftGO3Tc+f
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-