General
-
Target
amongys.exe
-
Size
78KB
-
Sample
250122-rsh4ks1pgn
-
MD5
ac27e93eee9c6e2f3922cd874fd8a4f7
-
SHA1
b571a07df2e9142094a16ba5fdb6c0b240518362
-
SHA256
c66c187f9ad62af25514cd5cb0389ac62dd7f18c8de86554500a961a485f6ab3
-
SHA512
58ed067f233f2f81e3872e01222d27b75390871c344f04ba577a7daa20beaa197677b5d75d1b4d605cd77f1ae2dc655d006db25dbab0d6f6ffdd134987cd187a
-
SSDEEP
1536:U/lUh43+M1iaxGqX/fvJ64ycsW53pwZPjg3fO7a9Px//tB9:j7cXGqPfvJcgqQLPx//tB9
Static task
static1
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
amongys.exe
-
Size
78KB
-
MD5
ac27e93eee9c6e2f3922cd874fd8a4f7
-
SHA1
b571a07df2e9142094a16ba5fdb6c0b240518362
-
SHA256
c66c187f9ad62af25514cd5cb0389ac62dd7f18c8de86554500a961a485f6ab3
-
SHA512
58ed067f233f2f81e3872e01222d27b75390871c344f04ba577a7daa20beaa197677b5d75d1b4d605cd77f1ae2dc655d006db25dbab0d6f6ffdd134987cd187a
-
SSDEEP
1536:U/lUh43+M1iaxGqX/fvJ64ycsW53pwZPjg3fO7a9Px//tB9:j7cXGqPfvJcgqQLPx//tB9
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-