General
-
Target
main.exe
-
Size
7.3MB
-
Sample
250122-qfg53sxpfv
-
MD5
17741d73622b968fb2994a7ecab90b21
-
SHA1
bf1676bd064c4b9a1151348bc4310c15f506d205
-
SHA256
9dc579518e8d00546ce132209aee6f5c8eb78b22ed5828f316cdf0f81c720521
-
SHA512
3a5833a9c687f79428707e1be15fcda5d7aacd21b05e765235efa13f6424d30d501f5bd85d6dc1b62bcab947dae7069334ed8fba39365b1fa217ad7daec62f06
-
SSDEEP
196608:/snm8b83kdaXMCHGLLc54i1wN+DrRRu7NtbFRKnZMvDrGmh1wlxN8:G5/cXMCHWUj7rRQ7XbFsn6vH5WN
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
178.173.246.113:4444
oWhXO4EcR5SY2tFa
-
install_file
USB.exe
Targets
-
-
Target
main.exe
-
Size
7.3MB
-
MD5
17741d73622b968fb2994a7ecab90b21
-
SHA1
bf1676bd064c4b9a1151348bc4310c15f506d205
-
SHA256
9dc579518e8d00546ce132209aee6f5c8eb78b22ed5828f316cdf0f81c720521
-
SHA512
3a5833a9c687f79428707e1be15fcda5d7aacd21b05e765235efa13f6424d30d501f5bd85d6dc1b62bcab947dae7069334ed8fba39365b1fa217ad7daec62f06
-
SSDEEP
196608:/snm8b83kdaXMCHGLLc54i1wN+DrRRu7NtbFRKnZMvDrGmh1wlxN8:G5/cXMCHWUj7rRQ7XbFsn6vH5WN
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-