General
-
Target
XS CRACK.exe
-
Size
22.1MB
-
Sample
250125-hm4cws1ld1
-
MD5
8313790fde74e18b43d255f830af9b00
-
SHA1
0123f92f250415b13f0b1a3c8e60d9b3212de255
-
SHA256
9576e9374b80cf62824e4de89e24f6bf18617e1ce62d21a1a1a0c72ce45c9090
-
SHA512
b120f54939840fd2881e0a8b39872456f8712a3cb7e4471c47618ca9268464a2fd743adac3ac85e014b130654d8d7edd3e4aa04a9982eee518201b4d7c1828e5
-
SSDEEP
1536:QebSCbpDbmenavCGrYuFJQ9ZrR9E4ub0tAr+:t+utbmHrYuFKrR95tAC
Static task
static1
Behavioral task
behavioral1
Sample
XS CRACK.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
very-stars.gl.at.ply.gg:23028
-
Install_directory
%ProgramData%
-
install_file
system64.exe
-
telegram
https://api.telegram.org/bot7592133817:AAFoMe-c16pn4My7-EODEINEZeWZ2Milavo/sendMessage?chat_id=6723354517
Extracted
gurcu
https://api.telegram.org/bot7592133817:AAFoMe-c16pn4My7-EODEINEZeWZ2Milavo/sendMessage?chat_id=6723354517
Targets
-
-
Target
XS CRACK.exe
-
Size
22.1MB
-
MD5
8313790fde74e18b43d255f830af9b00
-
SHA1
0123f92f250415b13f0b1a3c8e60d9b3212de255
-
SHA256
9576e9374b80cf62824e4de89e24f6bf18617e1ce62d21a1a1a0c72ce45c9090
-
SHA512
b120f54939840fd2881e0a8b39872456f8712a3cb7e4471c47618ca9268464a2fd743adac3ac85e014b130654d8d7edd3e4aa04a9982eee518201b4d7c1828e5
-
SSDEEP
1536:QebSCbpDbmenavCGrYuFJQ9ZrR9E4ub0tAr+:t+utbmHrYuFKrR95tAC
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Gurcu family
-
Modifies Windows Defender Real-time Protection settings
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1