General
-
Target
sex.exe
-
Size
63KB
-
Sample
250125-2ymdasvmhm
-
MD5
0b244bc9a9d1b236e2a9ad1757088be3
-
SHA1
f57f0e1373ede67afbe9832918c66161c16414dc
-
SHA256
509fcc68364e499b667b19c3ba7ab1bedcb7eb0831adea59954e37e73a44f79e
-
SHA512
d0c51da4bede55fa4b524c5604210587ead30b52499d7e9dd04e6735203021fdd3f04a6b77f7838b1c75797e21bfc10cfda1b2e35f6e9120659557fe261f9df5
-
SSDEEP
1536:Y776WKPld2VaaKBab7jfmuQ6mS0mOvsVxZ:Au7PldztBab7jo+OvszZ
Behavioral task
behavioral1
Sample
sex.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sex.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:52412
chudai-52412.portmap.host:52412
-
Install_directory
%Temp%
-
install_file
XClient.exe
Targets
-
-
Target
sex.exe
-
Size
63KB
-
MD5
0b244bc9a9d1b236e2a9ad1757088be3
-
SHA1
f57f0e1373ede67afbe9832918c66161c16414dc
-
SHA256
509fcc68364e499b667b19c3ba7ab1bedcb7eb0831adea59954e37e73a44f79e
-
SHA512
d0c51da4bede55fa4b524c5604210587ead30b52499d7e9dd04e6735203021fdd3f04a6b77f7838b1c75797e21bfc10cfda1b2e35f6e9120659557fe261f9df5
-
SSDEEP
1536:Y776WKPld2VaaKBab7jfmuQ6mS0mOvsVxZ:Au7PldztBab7jo+OvszZ
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-