General
-
Target
XWorm V5.6 PAID.7z
-
Size
29.0MB
-
Sample
250204-t4dz4stpdj
-
MD5
0ea984ec2d550a4205fabd911f973a6c
-
SHA1
71307409e69eb60fe612315e09d4109f91cf23c9
-
SHA256
6b7c8ac18f492b4536307f4680cd40a9990bafc716d451575ba46c124c3f07b9
-
SHA512
7bdb043850bbc32d41872b4090426e2193582b139e8be25972b25b9f9fe3a1c54e089a5738a78a804211031a010b8e9a6bd8d983cb534fb34d4a0f87e9484eba
-
SSDEEP
786432:WqVzpgbD+4aZ/INeMVKyBMtD2Op14tMIADxrHLfygiw:dgbD+XtFMVKyGUuI4ZHLfyK
Behavioral task
behavioral1
Sample
XWorm V5.6 PAID.7z
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral2
Sample
XWorm V5.6 PAID.7z
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
v1pmXhMionQszKjj
-
install_file
USB.exe
Targets
-
-
Target
XWorm V5.6 PAID.7z
-
Size
29.0MB
-
MD5
0ea984ec2d550a4205fabd911f973a6c
-
SHA1
71307409e69eb60fe612315e09d4109f91cf23c9
-
SHA256
6b7c8ac18f492b4536307f4680cd40a9990bafc716d451575ba46c124c3f07b9
-
SHA512
7bdb043850bbc32d41872b4090426e2193582b139e8be25972b25b9f9fe3a1c54e089a5738a78a804211031a010b8e9a6bd8d983cb534fb34d4a0f87e9484eba
-
SSDEEP
786432:WqVzpgbD+4aZ/INeMVKyBMtD2Op14tMIADxrHLfygiw:dgbD+XtFMVKyGUuI4ZHLfyK
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Modifies Windows Defender Real-time Protection settings
-
UAC bypass
-
Xworm family
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4