General
-
Target
loader_prod.exe
-
Size
89KB
-
Sample
250122-m4t8rstnfj
-
MD5
328d05edc1ca2d1d3cc892beca505143
-
SHA1
be02dc90c9f8993c7286ecdf15759e420b214ecf
-
SHA256
7f4036762f4c4b3e8172c8df055973b78bd2f697d9a9d29c194830b6b02394c7
-
SHA512
ae5617621611b8acd7954dffd493e065dbc6fc2830c6e5ac71b85ba3c89b43eb201a1ecf7f5f1fc6d30ed4cd4562be760c5476a51b6aef399f26e6198a55705d
-
SSDEEP
1536:Br8Ahimg9SRqFun0+Eu9AFVU9sLwKGcCHoS1oVZJeEAhtjlpDefQ01:BgNIqFun0+Ea2LUca8eEA/jldoQ0
Static task
static1
Behavioral task
behavioral1
Sample
loader_prod.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
trip-thesaurus.gl.at.ply.gg:16715
-
Install_directory
%AppData%
-
install_file
Update.exe
Targets
-
-
Target
loader_prod.exe
-
Size
89KB
-
MD5
328d05edc1ca2d1d3cc892beca505143
-
SHA1
be02dc90c9f8993c7286ecdf15759e420b214ecf
-
SHA256
7f4036762f4c4b3e8172c8df055973b78bd2f697d9a9d29c194830b6b02394c7
-
SHA512
ae5617621611b8acd7954dffd493e065dbc6fc2830c6e5ac71b85ba3c89b43eb201a1ecf7f5f1fc6d30ed4cd4562be760c5476a51b6aef399f26e6198a55705d
-
SSDEEP
1536:Br8Ahimg9SRqFun0+Eu9AFVU9sLwKGcCHoS1oVZJeEAhtjlpDefQ01:BgNIqFun0+Ea2LUca8eEA/jldoQ0
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1