General
-
Target
691b3dd703be9b8ab5dcb646730d9f338aee79358c353ba9374da156a0062704
-
Size
8.3MB
-
Sample
250302-qbv65svxav
-
MD5
cb7d433737004440959018b1eea41491
-
SHA1
74ab4752b36290469e33edbf84b3dcf7627ae34d
-
SHA256
691b3dd703be9b8ab5dcb646730d9f338aee79358c353ba9374da156a0062704
-
SHA512
1cd894a2067a37bd09c7a42ab65306ba6ef79d9eacc2221c7a9006c6bf6e838828a4be794d8745278801439dd1b842c867808c68274ea7088dd1ec28d08dba39
-
SSDEEP
196608:nW606kieYYwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAok:fHIH20drLYRZjok
Behavioral task
behavioral1
Sample
691b3dd703be9b8ab5dcb646730d9f338aee79358c353ba9374da156a0062704.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
691b3dd703be9b8ab5dcb646730d9f338aee79358c353ba9374da156a0062704.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
45.141.26.105:7000
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
691b3dd703be9b8ab5dcb646730d9f338aee79358c353ba9374da156a0062704
-
Size
8.3MB
-
MD5
cb7d433737004440959018b1eea41491
-
SHA1
74ab4752b36290469e33edbf84b3dcf7627ae34d
-
SHA256
691b3dd703be9b8ab5dcb646730d9f338aee79358c353ba9374da156a0062704
-
SHA512
1cd894a2067a37bd09c7a42ab65306ba6ef79d9eacc2221c7a9006c6bf6e838828a4be794d8745278801439dd1b842c867808c68274ea7088dd1ec28d08dba39
-
SSDEEP
196608:nW606kieYYwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAok:fHIH20drLYRZjok
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3