General
-
Target
SPOOFER.exe
-
Size
100KB
-
Sample
250123-f3h1satrgw
-
MD5
16a83a02e42ff5cccf920ab083ae38b8
-
SHA1
882dce9a3edb6908d02605594018a23b729052b6
-
SHA256
b51ff988152a1d96407941ee19298e7e4ce8035ce6dff054c3b439110dfb101d
-
SHA512
4ebd72f8a79884a90a71ba587fb2a6609a0a76a8d58e6d1d574dc280b7be71f4771a5fcf32d4c4d248ce4e0b5cd87aac04731e4f815ef2927eab26812f26d940
-
SSDEEP
3072:JoJpXPp1M4lq34QZ48dvVfyFp23HjQID+0w:ux1Hs4YBdvVauhL
Static task
static1
Behavioral task
behavioral1
Sample
SPOOFER.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
logo-kerry.gl.at.ply.gg:23249
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
SPOOFER.exe
-
Size
100KB
-
MD5
16a83a02e42ff5cccf920ab083ae38b8
-
SHA1
882dce9a3edb6908d02605594018a23b729052b6
-
SHA256
b51ff988152a1d96407941ee19298e7e4ce8035ce6dff054c3b439110dfb101d
-
SHA512
4ebd72f8a79884a90a71ba587fb2a6609a0a76a8d58e6d1d574dc280b7be71f4771a5fcf32d4c4d248ce4e0b5cd87aac04731e4f815ef2927eab26812f26d940
-
SSDEEP
3072:JoJpXPp1M4lq34QZ48dvVfyFp23HjQID+0w:ux1Hs4YBdvVauhL
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-