General
-
Target
WinlockerBuilderv0.6.exe
-
Size
1.3MB
-
Sample
250124-3gccfavrhl
-
MD5
a00721b4615c9ab1c166f08baf5233e3
-
SHA1
96ab6fee83413faaf6c3e77b52f2684dee0cb76d
-
SHA256
fa7bd4b4c4f621aa00c0007f4af4363904f6e4a2b5ca545e4b38e2de23cb473f
-
SHA512
eedf0da3b1f08c5ca46402e6600ea20c2f35310080bdd8c86413e5db5f17f81dca69c79378859a46647b5cbd3684a1d2332733bd03705721d0d0d0056caaf001
-
SSDEEP
24576:FMbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PH:70c+Gr1YBrNXcEFVf6pPH
Static task
static1
Behavioral task
behavioral1
Sample
WinlockerBuilderv0.6.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
vTtlhGPfn0ebMPsq
-
Install_directory
%Public%
-
install_file
explorer.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Targets
-
-
Target
WinlockerBuilderv0.6.exe
-
Size
1.3MB
-
MD5
a00721b4615c9ab1c166f08baf5233e3
-
SHA1
96ab6fee83413faaf6c3e77b52f2684dee0cb76d
-
SHA256
fa7bd4b4c4f621aa00c0007f4af4363904f6e4a2b5ca545e4b38e2de23cb473f
-
SHA512
eedf0da3b1f08c5ca46402e6600ea20c2f35310080bdd8c86413e5db5f17f81dca69c79378859a46647b5cbd3684a1d2332733bd03705721d0d0d0056caaf001
-
SSDEEP
24576:FMbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PH:70c+Gr1YBrNXcEFVf6pPH
-
Detect Xworm Payload
-
Modifies visiblity of hidden/system files in Explorer
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2