General
-
Target
idk.exe
-
Size
78KB
-
Sample
250122-rtxy5a1qdr
-
MD5
662afd232c27ffeacb7e5e8659eeccec
-
SHA1
3db0da6493cb893b06ae08380d118beeb15993bc
-
SHA256
dd72847951db3e210cbd52e0d342f87dc7bbffbec60d7ed8d5f73aa63a0b36d3
-
SHA512
42818adf68c7f5deec6e85bc70aea7428d85959391be9035e502cbe448d088375ea348886a6cac92542a67ac117cd52dbfe720ced89dcc97001cbc1761023135
-
SSDEEP
1536:1pfrzPokYK9mUzEnTPJ5g6EKuKa36MSPoorfXr3ZoTH+aJWRTILUG:zLok9TzEnThFsJho5Nk4G
Static task
static1
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
idk.exe
-
Size
78KB
-
MD5
662afd232c27ffeacb7e5e8659eeccec
-
SHA1
3db0da6493cb893b06ae08380d118beeb15993bc
-
SHA256
dd72847951db3e210cbd52e0d342f87dc7bbffbec60d7ed8d5f73aa63a0b36d3
-
SHA512
42818adf68c7f5deec6e85bc70aea7428d85959391be9035e502cbe448d088375ea348886a6cac92542a67ac117cd52dbfe720ced89dcc97001cbc1761023135
-
SSDEEP
1536:1pfrzPokYK9mUzEnTPJ5g6EKuKa36MSPoorfXr3ZoTH+aJWRTILUG:zLok9TzEnThFsJho5Nk4G
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-