General
-
Target
9d1b9105b7353da000d36facf2c6a88d8ac164e0ef0e5b3d35087ce2c746d0bf
-
Size
862KB
-
Sample
250227-m45z9swkw6
-
MD5
fa67bb866526541356373b33f0f59dca
-
SHA1
b53731f480c4e042abb1f2823e4dffe0d92eb668
-
SHA256
9d1b9105b7353da000d36facf2c6a88d8ac164e0ef0e5b3d35087ce2c746d0bf
-
SHA512
8f1a459ab747313135461c9f643ccb1f2fca84074d44249a53993006251e1c68582596f0c9e8c632a4176a5d0d3c718c74bc70580fe17ad6b141f1ac7248e83d
-
SSDEEP
12288:yQqhxK0pYL8a00PiaU6bmPE2CBiKBlak98Djw1P+xovk+/aEfR9MuQ9ZLfmGtMC2:ynhY06LZ8HmfBROkJlc+/ZzMuQZLnq
Static task
static1
Behavioral task
behavioral1
Sample
LPO_2400320057.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LPO_2400320057.pdf.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
162.244.210.204:8888
-
install_file
USB.exe
Targets
-
-
Target
LPO_2400320057.pdf.exe
-
Size
1.8MB
-
MD5
ad1de3461d1a1ca1e1308b470189e33e
-
SHA1
4f31564e88f4dbef9de32921e3ce3e7577fd1025
-
SHA256
2663813a533d2a48f9eaf8eda1b3536578377faf3008da63035fb050cb8370e3
-
SHA512
e80da0a03b8c9b86cb59c37e9a9867a8ea21ec4bc0aa3e5c571cd80434f6c4a2b5d04dcf770d5eac098d121a6cf832eae623a73be0f9970e3417affb304d0b49
-
SSDEEP
24576:95tC5kWkHIVTl45p3aLpZso9Tz+hGu2Wq:9W7OQpZsiOAus
-
Detect Xworm Payload
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
ModiLoader Second Stage
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1