General
-
Target
WinlockerBuilderv0.6.exe
-
Size
1.3MB
-
Sample
250124-24sr9svlfn
-
MD5
22f77fb76f7478b05dd829e1a5dd12e1
-
SHA1
69edbca2063b2446fc6209bc4545cf901c83ada6
-
SHA256
a6fce61792c9ec95e7245c7b76771c984f5e897cb4f35c0661639f197e289433
-
SHA512
ef7ee6750f58461fd21690e8ab0f43dea72d4a3ab8f130e086f24d8f5c5295a3585947ae697d7aeb5f2bca5ab42b24a804cb50c39e9adbaffb2edc38cb09a368
-
SSDEEP
24576:qMbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PH:o0c+Gr1YBrNXcEFVf6pPH
Static task
static1
Behavioral task
behavioral1
Sample
WinlockerBuilderv0.6.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
vTtlhGPfn0ebMPsq
-
Install_directory
%Public%
-
install_file
explorer.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Targets
-
-
Target
WinlockerBuilderv0.6.exe
-
Size
1.3MB
-
MD5
22f77fb76f7478b05dd829e1a5dd12e1
-
SHA1
69edbca2063b2446fc6209bc4545cf901c83ada6
-
SHA256
a6fce61792c9ec95e7245c7b76771c984f5e897cb4f35c0661639f197e289433
-
SHA512
ef7ee6750f58461fd21690e8ab0f43dea72d4a3ab8f130e086f24d8f5c5295a3585947ae697d7aeb5f2bca5ab42b24a804cb50c39e9adbaffb2edc38cb09a368
-
SSDEEP
24576:qMbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PH:o0c+Gr1YBrNXcEFVf6pPH
-
Detect Xworm Payload
-
Modifies visiblity of hidden/system files in Explorer
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2