General
-
Target
conn.exe
-
Size
28.2MB
-
Sample
250302-nt3b3atvax
-
MD5
b5a2749b7ad6f8e070c1ad2761f99232
-
SHA1
a7a50a9cdb6dc603d38f7642849264b7d6cb78f8
-
SHA256
e58993fa804654f6560f73f8a4cdd77fc0bf1057c1929ea11227fbf7aa3721c4
-
SHA512
f577a1e6a59518bcf1afd502ef712cf6ab8a1c522e94662b2edac7edfffca25468fb862aa754a75b131f5e2df517798ae5e05125b68384ddd855d6a2d5796176
-
SSDEEP
786432:8tu0coshxWHVn6s6b64G71jaoCo1Ha2XreZd9nmF92:iu0jyC6Fb6V71JCo1RkdFs
Behavioral task
behavioral1
Sample
conn.exe
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
xworm
5.0
thetest.selfhost.co:1339
hyd6qZsPPsPPgljc
-
Install_directory
%ProgramData%
-
install_file
DirectOutputService.exe
Targets
-
-
Target
conn.exe
-
Size
28.2MB
-
MD5
b5a2749b7ad6f8e070c1ad2761f99232
-
SHA1
a7a50a9cdb6dc603d38f7642849264b7d6cb78f8
-
SHA256
e58993fa804654f6560f73f8a4cdd77fc0bf1057c1929ea11227fbf7aa3721c4
-
SHA512
f577a1e6a59518bcf1afd502ef712cf6ab8a1c522e94662b2edac7edfffca25468fb862aa754a75b131f5e2df517798ae5e05125b68384ddd855d6a2d5796176
-
SSDEEP
786432:8tu0coshxWHVn6s6b64G71jaoCo1Ha2XreZd9nmF92:iu0jyC6Fb6V71JCo1RkdFs
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1