General
-
Target
Winlocker Builder v0.6.exe
-
Size
1.4MB
-
Sample
250124-3czxyatpbt
-
MD5
6b6a8cd5e51f45e84db0faf0e23bce20
-
SHA1
9ddfb0ea0ee600dcd5f8ef1878a19f4bb874cafd
-
SHA256
2eddf88a155ffdb09a1382d1955d26ae5e394def25a2eb4d8c558babce0acde4
-
SHA512
17dc258784448706eb3de95d328858dd64a15a7cd7abd33cac1cf8f0b6d73d58c0a7514f852f7159b9fb9996055cd942b101ebc53186e6722d168367075a698b
-
SSDEEP
24576:HYbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PHk:F0c+Gr1YBrNXcEFVf6pPH
Static task
static1
Behavioral task
behavioral1
Sample
Winlocker Builder v0.6.exe
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
5.0
vTtlhGPfn0ebMPsq
-
Install_directory
%Public%
-
install_file
explorer.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Targets
-
-
Target
Winlocker Builder v0.6.exe
-
Size
1.4MB
-
MD5
6b6a8cd5e51f45e84db0faf0e23bce20
-
SHA1
9ddfb0ea0ee600dcd5f8ef1878a19f4bb874cafd
-
SHA256
2eddf88a155ffdb09a1382d1955d26ae5e394def25a2eb4d8c558babce0acde4
-
SHA512
17dc258784448706eb3de95d328858dd64a15a7cd7abd33cac1cf8f0b6d73d58c0a7514f852f7159b9fb9996055cd942b101ebc53186e6722d168367075a698b
-
SSDEEP
24576:HYbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PHk:F0c+Gr1YBrNXcEFVf6pPH
-
Detect Xworm Payload
-
Modifies visiblity of hidden/system files in Explorer
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2