General
-
Target
stub.exe
-
Size
98KB
-
Sample
250125-mxngmszjgv
-
MD5
bdfa5841c9e4eef468202a788c52dec2
-
SHA1
71756d583a44fb8ac91b20c2d973b91acadb9753
-
SHA256
1def3bf1a5e4da176b49943bfa039ff657d71b4d60aa6b1c9116484f73d0fc71
-
SHA512
2b92282c1338b5808e2a9bfa62a55a431d11cb98d5e5ea848c24fa209bd566402bfb323c3cd21083048d8a7efd55012e40bcf3c679f54f4f5a159ff98b7aa4c2
-
SSDEEP
1536:WuYbI6lmBJK9pGmDKdd5xy2zizytvJIWUIeEJ7DvRDaGeqCd8Ft6mUq:rYbI6yPdnxxieaWUrEd7Na6C+jUq
Static task
static1
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%ProgramData%
Targets
-
-
Target
stub.exe
-
Size
98KB
-
MD5
bdfa5841c9e4eef468202a788c52dec2
-
SHA1
71756d583a44fb8ac91b20c2d973b91acadb9753
-
SHA256
1def3bf1a5e4da176b49943bfa039ff657d71b4d60aa6b1c9116484f73d0fc71
-
SHA512
2b92282c1338b5808e2a9bfa62a55a431d11cb98d5e5ea848c24fa209bd566402bfb323c3cd21083048d8a7efd55012e40bcf3c679f54f4f5a159ff98b7aa4c2
-
SSDEEP
1536:WuYbI6lmBJK9pGmDKdd5xy2zizytvJIWUIeEJ7DvRDaGeqCd8Ft6mUq:rYbI6yPdnxxieaWUrEd7Na6C+jUq
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-