General
-
Target
Perm-spofer.exe
-
Size
68KB
-
Sample
250122-ta7ekavler
-
MD5
7214f6d7b7997cbfb22a9b3e6375b918
-
SHA1
a9c53eb43e7b0eb1cfc0bc4714bc3816274310d9
-
SHA256
c54762e7cfed04c23c765dd85ea5e92fcdc30e34d5ff3b151595e73e50e95c03
-
SHA512
dc40ea0a445f2fd5a7c0e9a90d391d72267d02bc004af57f494e52e492d02de196c06d7335971868e55b0a8b18bc640b89f2c56837194c79227f5a48c9e8a223
-
SSDEEP
1536:fVNtqrwwjZ2v5yNL0c+A4qvbWWEHLhASFtx6aMrTeOg54WER:fBzByNnP4qvbWWAASbaKOg54j
Behavioral task
behavioral1
Sample
Perm-spofer.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
simply-exotic.gl.at.ply.gg:27183
-
Install_directory
%Temp%
-
install_file
USB.exe
Targets
-
-
Target
Perm-spofer.exe
-
Size
68KB
-
MD5
7214f6d7b7997cbfb22a9b3e6375b918
-
SHA1
a9c53eb43e7b0eb1cfc0bc4714bc3816274310d9
-
SHA256
c54762e7cfed04c23c765dd85ea5e92fcdc30e34d5ff3b151595e73e50e95c03
-
SHA512
dc40ea0a445f2fd5a7c0e9a90d391d72267d02bc004af57f494e52e492d02de196c06d7335971868e55b0a8b18bc640b89f2c56837194c79227f5a48c9e8a223
-
SSDEEP
1536:fVNtqrwwjZ2v5yNL0c+A4qvbWWEHLhASFtx6aMrTeOg54WER:fBzByNnP4qvbWWAASbaKOg54j
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1