General
-
Target
wow.exe
-
Size
14.8MB
-
Sample
250127-h5hh5sxlfs
-
MD5
b2c17e4aaa1ab07e2be2c6e08120c7fe
-
SHA1
67eb0fbafb9d75d7e95dc8429c09a99e73ed5c74
-
SHA256
d6427e58dfa1a8bfb69f510d4c3806c36cbb7fcfac82984cafcd2ff539631f0d
-
SHA512
5ec8edc34ebd4329c263fd43a76fbecc69d4af248b86d40ba69df40ba85b78bf0e5abb2fcb3b65708b726cdc3fe594e06f27ae637f98a038b9249c399b52b223
-
SSDEEP
393216:gOWd863huc1dQJlAoF3MnG3WaiVLedWmoNr/xHWgrHz:5893hr1dQJ3MGGZKUpT
Behavioral task
behavioral1
Sample
wow.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
WlO6Om8yfxIARVE4
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/7G6zzQwJ
Extracted
asyncrat
Xchallenger | 3Losh
heg
nowmnew.loseyourip.com:6606
AsyncMutex_uiavxx654omzkk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
wow.exe
-
Size
14.8MB
-
MD5
b2c17e4aaa1ab07e2be2c6e08120c7fe
-
SHA1
67eb0fbafb9d75d7e95dc8429c09a99e73ed5c74
-
SHA256
d6427e58dfa1a8bfb69f510d4c3806c36cbb7fcfac82984cafcd2ff539631f0d
-
SHA512
5ec8edc34ebd4329c263fd43a76fbecc69d4af248b86d40ba69df40ba85b78bf0e5abb2fcb3b65708b726cdc3fe594e06f27ae637f98a038b9249c399b52b223
-
SSDEEP
393216:gOWd863huc1dQJlAoF3MnG3WaiVLedWmoNr/xHWgrHz:5893hr1dQJ3MGGZKUpT
-
Asyncrat family
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-