General
-
Target
8216fb31e6a6eb3fe821086dd4d11648002c5be52dd239cd49ee0174b3e81eac
-
Size
51KB
-
Sample
250124-1mjmlazpbv
-
MD5
de65269116e2dd3b7928169549a6079a
-
SHA1
cbdffa57d6150c4813bba234d6175107bf08928e
-
SHA256
8216fb31e6a6eb3fe821086dd4d11648002c5be52dd239cd49ee0174b3e81eac
-
SHA512
f77b0d37eb9032f0e7e9cd5ecd8693fba2013af69fb10816c64b91f3d6555d506eae8a1e457ded320058a93ead2cae24ed4fa0714135fb8ec8e0e43cb030f7c7
-
SSDEEP
1536:57+oKOX7c1zY5xt3GWJSj/FN+gkzEMKVlJl2:53rmY5xtWcSTFNG+/L2
Behavioral task
behavioral1
Sample
Catlavan.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Catlavan.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:30540
take-continually.gl.at.ply.gg:30540
-
Install_directory
%AppData%
-
install_file
WindowsDefender.exe
Targets
-
-
Target
Catlavan.exe
-
Size
74KB
-
MD5
cafec0e0f7eab47ab7cf90a1dd593f4f
-
SHA1
76c66c7232dac83c1ac2726ceff034591aa447cb
-
SHA256
05e568b534ae869db91152a0190d41a1bef9492bce1a06a46bc1fd76617dd0a5
-
SHA512
0b359db626ba17af3d10802927f2785f05e23f21079e2313c2ad32e5cef94c9e27ff0b810cee7d9a65fb66ae15462c18860570a62a8fdd12529d57043d08d498
-
SSDEEP
1536:zNx7MEFOzuMuQmN3+bTtdTEhakV0r6L5yhbsGOBR8X7Xwci:YaOqMuQg+bTjEV0YyljOBOXEci
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-