General
-
Target
vt0.msi
-
Size
39.9MB
-
Sample
250228-lnempsyms5
-
MD5
58729f548d660722ab09292e15a0fe45
-
SHA1
8a29bb19fd4f42fc4ef1af32d65265fb152b6f99
-
SHA256
a6382c10dfd269e3315fe4cdfb158c00aea1a179450cf3d3b633acf7e2123d74
-
SHA512
fa75ab3e28d829f39b14fd9e490d7247e102a81ff668468bd44cfc9c553e1f44d7df9d71d8e4517cdd086e23bae192ee1cad0ca96c57f465c4e8dc4ee539e0e2
-
SSDEEP
786432:CueucOCp8Ax4Hl/wBg1z9/XUbEBWExPRXG5pYolpXOUGPY9E9jzfGnHvga4I8Q:Cue3NpJx4tRz9CoPRXWYHHNJbGnP
Static task
static1
Behavioral task
behavioral1
Sample
vt0.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
vt0.msi
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
5.0
154.197.33.29:7000
3MKBwUt55yRv3NZh
-
install_file
USB.exe
Targets
-
-
Target
vt0.msi
-
Size
39.9MB
-
MD5
58729f548d660722ab09292e15a0fe45
-
SHA1
8a29bb19fd4f42fc4ef1af32d65265fb152b6f99
-
SHA256
a6382c10dfd269e3315fe4cdfb158c00aea1a179450cf3d3b633acf7e2123d74
-
SHA512
fa75ab3e28d829f39b14fd9e490d7247e102a81ff668468bd44cfc9c553e1f44d7df9d71d8e4517cdd086e23bae192ee1cad0ca96c57f465c4e8dc4ee539e0e2
-
SSDEEP
786432:CueucOCp8Ax4Hl/wBg1z9/XUbEBWExPRXG5pYolpXOUGPY9E9jzfGnHvga4I8Q:Cue3NpJx4tRz9CoPRXWYHHNJbGnP
-
Detect Xworm Payload
-
Xworm family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Event Triggered Execution
1Installer Packages
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
1System Binary Proxy Execution
1Msiexec
1