General
-
Target
Nerest Crack by ZevsHacker.rar
-
Size
35KB
-
Sample
250124-xlt56avjdq
-
MD5
c77336e5ee078ad00e41eac9ac2ef8be
-
SHA1
3c690525de752a64c9dcd7e0bd404a8bf7c7a6f6
-
SHA256
68a22c99d75a30d9bd60980eb78315d505b250d8a7093e545ac5a7b1c39f67ae
-
SHA512
94d7433095473021bb156196dc87b6ea829cdd8c25b1a9678325c4682e78c23fd6a80f3bd197e9b41576a3c7515d83ec7ed8f786b064a10cd164d1763ed2f946
-
SSDEEP
768:aISSklsDWiYv3FfhlUvWY2i3ugkE2Q13Aw3wI9rJzgAT:PSSSiYv3Fffw2i/nJsI9rJ7T
Behavioral task
behavioral1
Sample
Nerest/Nerest Crack.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Nerest/Nerest Crack.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
you-cigarette.gl.at.ply.gg:30434
-
Install_directory
%Public%
-
install_file
XClient.exe
Targets
-
-
Target
Nerest/Nerest Crack.exe
-
Size
115KB
-
MD5
ae7e7ad5099597db8f14ee26fd5cee52
-
SHA1
53fe58268d74ca2c2caf5bce1449e488a546d30d
-
SHA256
8a441778a38026427e889a79b248fdffa17edf31da5fceff03de1a9611d0f629
-
SHA512
7d757ec1567cca840e282d72ad89996083f22b30d858a9617cc299dcaa1cdc290e20b30db3bfbbaa1c59510e87b74d180461ba25e76b626bd7405e45de6e08d8
-
SSDEEP
1536:QH3h0qpEK83YpNQSUEbRRfk7SZF6/Og4Zd:QXByK836rbRmS6Og47
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1