General
-
Target
WinlockerBuilderv0.6.exe
-
Size
1.3MB
-
Sample
250125-aevrsaxkdn
-
MD5
4f768716267ee42c40f6cb0578bae261
-
SHA1
e143ab8ad439e224232bac5d0edc7f2051cbdc13
-
SHA256
86bcea956a17faa66f5354fe890fae5fc41d2156b28ec1030d58aa9c51e32299
-
SHA512
5f51a734c6eef7a9aba22e78c8dece02bff2adee06f8551f2f7fd57b77a6f2a22c39f46930bcf1f62c116725ef0fd5e56d7da7a893210a35c2f2721949de0a27
-
SSDEEP
24576:DbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PHk:U0c+Gr1YBrNXcEFVf6pPH
Static task
static1
Behavioral task
behavioral1
Sample
WinlockerBuilderv0.6.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
vTtlhGPfn0ebMPsq
-
Install_directory
%Public%
-
install_file
explorer.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Targets
-
-
Target
WinlockerBuilderv0.6.exe
-
Size
1.3MB
-
MD5
4f768716267ee42c40f6cb0578bae261
-
SHA1
e143ab8ad439e224232bac5d0edc7f2051cbdc13
-
SHA256
86bcea956a17faa66f5354fe890fae5fc41d2156b28ec1030d58aa9c51e32299
-
SHA512
5f51a734c6eef7a9aba22e78c8dece02bff2adee06f8551f2f7fd57b77a6f2a22c39f46930bcf1f62c116725ef0fd5e56d7da7a893210a35c2f2721949de0a27
-
SSDEEP
24576:DbXvsRLDInc+3WNyc4aKZQ6VvDrVq3EXcWdFVtV6d/PHk:U0c+Gr1YBrNXcEFVf6pPH
-
Detect Xworm Payload
-
Modifies visiblity of hidden/system files in Explorer
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2