General
-
Target
3aece62e514da11c67ac56435e3f2da7cf63d38a75f4d716dcaaa36310915eff
-
Size
870KB
-
Sample
250227-n7gmhsxly5
-
MD5
1e2bc4467a1ca17e33ede3f3cc68920d
-
SHA1
86faa46632bb2c7700c1d5ccbf716ccaa15344b2
-
SHA256
3aece62e514da11c67ac56435e3f2da7cf63d38a75f4d716dcaaa36310915eff
-
SHA512
3bb64e4ae30192d108e9784261e652f8bd88b8b9c15c21b2997b26716b6ba86e83f594abeaf4887930232b7115ca03ce76b6469b78062004028eb29893f78c47
-
SSDEEP
24576:xnhY06LZ8HmfB8dFhOXohBIaQwU85l8ksU:xhY06N8GfBWF3hLrU8HXsU
Static task
static1
Behavioral task
behavioral1
Sample
Request for Invoice to Process Payment.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Request for Invoice to Process Payment.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
23.94.126.41:8888
-
install_file
USB.exe
Targets
-
-
Target
Request for Invoice to Process Payment.exe
-
Size
1.8MB
-
MD5
6f1ead21aa70a3e69cd5c69595fc7916
-
SHA1
5feacb3a236a1e2a981540aca03fc6ab16d2aa76
-
SHA256
36f19ccdfa20772ebeb1c2a89e0edd174465f5ac697323b4ab05c2a46ec1a1a7
-
SHA512
800dc490d482582859ce6a1be834c5a13b501489329eab592fcc67f128462aa8424c9f5f5ec351124b9df660a1e8044786ce6b488ee34fdd0bf37fe9f2d224d5
-
SSDEEP
24576:95tC5kWkHIVTl45p3aLpZsEFj8z2NJMW1O1EmSSTCSHkbe:9W7OQpZsEFBNsEmw
-
Detect Xworm Payload
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
ModiLoader Second Stage
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1