General
-
Target
ASpoofer.exe
-
Size
266KB
-
Sample
250125-x4sp2sxkey
-
MD5
bc02803808b0fef29141032a807e855f
-
SHA1
c9d6339a10b06f4ad4175664c8728f6622d83855
-
SHA256
1670b4755805f0d523fba188435da1357c62562153db2b8fa5743ab9906e2c54
-
SHA512
2c27607c0c921e2d86a2e63bc7b2a0cea0df6f29d693ad9e91c16895ef348a6f415b2eaaeb74c41e25a65c3bd1c69578c78866725de6b1832f89f4283f71c0c3
-
SSDEEP
6144:YM+vTWbj7v/5bTgVziHzZnSKrCbYMBbX8Sq:YM+vo7v/5/gVziHlBrCbYq8b
Behavioral task
behavioral1
Sample
ASpoofer.exe
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
install_file
Mason.exe
Targets
-
-
Target
ASpoofer.exe
-
Size
266KB
-
MD5
bc02803808b0fef29141032a807e855f
-
SHA1
c9d6339a10b06f4ad4175664c8728f6622d83855
-
SHA256
1670b4755805f0d523fba188435da1357c62562153db2b8fa5743ab9906e2c54
-
SHA512
2c27607c0c921e2d86a2e63bc7b2a0cea0df6f29d693ad9e91c16895ef348a6f415b2eaaeb74c41e25a65c3bd1c69578c78866725de6b1832f89f4283f71c0c3
-
SSDEEP
6144:YM+vTWbj7v/5bTgVziHzZnSKrCbYMBbX8Sq:YM+vo7v/5/gVziHlBrCbYq8b
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1