General
-
Target
aac2bb6ed014b4e73f263b69d11ccc37fa1b94cfccacbfacc564fcead1bc9340
-
Size
190KB
-
Sample
250124-wbn1qazmex
-
MD5
180735cd524d00759a5f261123a6c0d0
-
SHA1
cdb05596dd091c51525e573fb061ef15bfd9ae83
-
SHA256
aac2bb6ed014b4e73f263b69d11ccc37fa1b94cfccacbfacc564fcead1bc9340
-
SHA512
9fdd5fe3dd1a01f20e524138aa4b4d2daca206d666b4978a5bf73538d0810edee81b353decbdc5fa534870c68ff5d05e8bbe9f1fec8bf6ffff6125a1dc46cf5f
-
SSDEEP
3072:l/Wr3qjGBaMWrmS24qBZDhAxPWUMWkZoGv/rFVHvTQINontDme41OOjluUnd2bzD:l/ckr6HBZDONv1jmHHvHNonlm+OZBe
Static task
static1
Behavioral task
behavioral1
Sample
aac2bb6ed014b4e73f263b69d11ccc37fa1b94cfccacbfacc564fcead1bc9340.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7777
tEPO2T8ayqFvBb4T
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
aac2bb6ed014b4e73f263b69d11ccc37fa1b94cfccacbfacc564fcead1bc9340
-
Size
190KB
-
MD5
180735cd524d00759a5f261123a6c0d0
-
SHA1
cdb05596dd091c51525e573fb061ef15bfd9ae83
-
SHA256
aac2bb6ed014b4e73f263b69d11ccc37fa1b94cfccacbfacc564fcead1bc9340
-
SHA512
9fdd5fe3dd1a01f20e524138aa4b4d2daca206d666b4978a5bf73538d0810edee81b353decbdc5fa534870c68ff5d05e8bbe9f1fec8bf6ffff6125a1dc46cf5f
-
SSDEEP
3072:l/Wr3qjGBaMWrmS24qBZDhAxPWUMWkZoGv/rFVHvTQINontDme41OOjluUnd2bzD:l/ckr6HBZDONv1jmHHvHNonlm+OZBe
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-