General
-
Target
SecurityHealthSystray.exe
-
Size
377KB
-
Sample
250125-1yeg1stkep
-
MD5
6551f7063b52d4ecac238087e67068ff
-
SHA1
93bc3ad6922956dde60b80034c63d4af31777e3f
-
SHA256
10fbf7403dfff9e5e7deba321401d4c0954595df1683a75b698dff9e36d6162c
-
SHA512
ab7bc460eeae4418f9979a72447a639130650ae8e06af89e3561cf931985373e3f940c5b695828f4b725daf7ae211861c0c7e078119dc349c8010725138ef0b6
-
SSDEEP
6144:IjN1wBG/3chyBctnXM8Dx3PRd7GIiiW0lxJ:IHzgyBctnXMMtGIi+
Static task
static1
Behavioral task
behavioral1
Sample
SecurityHealthSystray.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecurityHealthSystray.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
szqdzaa-22376.portmap.host:22376
-
Install_directory
%AppData%
-
install_file
SecurityHealthSystray.exe
-
telegram
https://api.telegram.org/bot6452802278:AAF2PAliVpXJNIcPNYSggwPXTiOwgl_RL_k/sendMessage?chat_id=5355197127
Targets
-
-
Target
SecurityHealthSystray.exe
-
Size
377KB
-
MD5
6551f7063b52d4ecac238087e67068ff
-
SHA1
93bc3ad6922956dde60b80034c63d4af31777e3f
-
SHA256
10fbf7403dfff9e5e7deba321401d4c0954595df1683a75b698dff9e36d6162c
-
SHA512
ab7bc460eeae4418f9979a72447a639130650ae8e06af89e3561cf931985373e3f940c5b695828f4b725daf7ae211861c0c7e078119dc349c8010725138ef0b6
-
SSDEEP
6144:IjN1wBG/3chyBctnXM8Dx3PRd7GIiiW0lxJ:IHzgyBctnXMMtGIi+
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1