General
-
Target
SolaraX.exe
-
Size
74KB
-
Sample
250302-a8hpbaymz7
-
MD5
aef41983064b12d1e648100e8141bf19
-
SHA1
b258d4a810e818e9c9dcaba62f75f34036b60fcd
-
SHA256
834bcea2665dc99b4c16fe87095f3e2b44e2e013ec1017407a061a1203c2f3cf
-
SHA512
2e4e3fdf7cd1892b73cf1989dfd82d91c677653a4501f44bb2d74b153b72982e069998b5bef097a7645970838c13ac86ec546173f6baf3afb7cbc26e6c9d5524
-
SSDEEP
1536:CSwcF9ZPLxJfu4OjKOd5fbLioM5706leROrV3P7UN:dwcF9ZPG4O+Od5fbLilveROrpw
Behavioral task
behavioral1
Sample
SolaraX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SolaraX.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
127.0.0.1:34930
minimum-ball.gl.at.ply.gg:34930
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Targets
-
-
Target
SolaraX.exe
-
Size
74KB
-
MD5
aef41983064b12d1e648100e8141bf19
-
SHA1
b258d4a810e818e9c9dcaba62f75f34036b60fcd
-
SHA256
834bcea2665dc99b4c16fe87095f3e2b44e2e013ec1017407a061a1203c2f3cf
-
SHA512
2e4e3fdf7cd1892b73cf1989dfd82d91c677653a4501f44bb2d74b153b72982e069998b5bef097a7645970838c13ac86ec546173f6baf3afb7cbc26e6c9d5524
-
SSDEEP
1536:CSwcF9ZPLxJfu4OjKOd5fbLioM5706leROrV3P7UN:dwcF9ZPG4O+Od5fbLilveROrpw
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1