General
-
Target
kZJh2zU8xf605cQ.exe
-
Size
1.0MB
-
Sample
250125-1kyzha1lhx
-
MD5
ef006cf204a8e12a2ea40abd4116fb61
-
SHA1
35b3038c748cc29bd0375e94536e1d0fc407e876
-
SHA256
1f3cd4dceeb34f2461fdd41d264624239463c7336572b270cec2b57a4ce7610e
-
SHA512
fd4d31b52171697616083f5309af8b7e1df43d596ebbb2cc579595dcf9bbd678cc7d53ea70c0c29d2c514c84c10130f0005129e1ffaa544940933f533d3b6266
-
SSDEEP
12288:D9TowR3+WnYndEx1MfkwbSUhsGWBK/rAcBUajgYQkYf0Tle5:xTowR3+WnYndEx1KkjGWBuzgYh4p5
Static task
static1
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%ProgramData%
Targets
-
-
Target
kZJh2zU8xf605cQ.exe
-
Size
1.0MB
-
MD5
ef006cf204a8e12a2ea40abd4116fb61
-
SHA1
35b3038c748cc29bd0375e94536e1d0fc407e876
-
SHA256
1f3cd4dceeb34f2461fdd41d264624239463c7336572b270cec2b57a4ce7610e
-
SHA512
fd4d31b52171697616083f5309af8b7e1df43d596ebbb2cc579595dcf9bbd678cc7d53ea70c0c29d2c514c84c10130f0005129e1ffaa544940933f533d3b6266
-
SSDEEP
12288:D9TowR3+WnYndEx1MfkwbSUhsGWBK/rAcBUajgYQkYf0Tle5:xTowR3+WnYndEx1KkjGWBuzgYh4p5
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-