General
-
Target
msedge.exe
-
Size
9.6MB
-
Sample
250122-sxcb9stpcr
-
MD5
12836b3817f7e85b810575446bb72255
-
SHA1
dd0f8dca4eceef452c870e3c8bbfdade5af5d55a
-
SHA256
1218026b31245222007dd76af6add1ad688e68c1bb6480c24e9d0ebbdc7e2d6b
-
SHA512
5fb88f976038beae520621fb7e7cdef66e0ca613f2856b2af9aea011b2c1e6f8a9eb534fe079c9d4572aae2ac1465153bfde9892cb8a4d25a186169836005bbd
-
SSDEEP
196608:FevF+BpyvdJFOcTnMLghtBuXnmHzWR+1/apPBd:wv4Bs8eMMLuXnOyRaaP
Static task
static1
Malware Config
Extracted
xworm
6.tcp.eu.ngrok.io:27099
-
Install_directory
%AppData%
-
install_file
Update.exe
Targets
-
-
Target
msedge.exe
-
Size
9.6MB
-
MD5
12836b3817f7e85b810575446bb72255
-
SHA1
dd0f8dca4eceef452c870e3c8bbfdade5af5d55a
-
SHA256
1218026b31245222007dd76af6add1ad688e68c1bb6480c24e9d0ebbdc7e2d6b
-
SHA512
5fb88f976038beae520621fb7e7cdef66e0ca613f2856b2af9aea011b2c1e6f8a9eb534fe079c9d4572aae2ac1465153bfde9892cb8a4d25a186169836005bbd
-
SSDEEP
196608:FevF+BpyvdJFOcTnMLghtBuXnmHzWR+1/apPBd:wv4Bs8eMMLuXnOyRaaP
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-