General
-
Target
rc72.exe
-
Size
85KB
-
Sample
250303-2gvcks1zcs
-
MD5
7d8c06573fad926b86f5dcca4d79a938
-
SHA1
1deb1612b61a7074dba865546110e019e76d32e7
-
SHA256
b271c8c74d2f172b07adf103779729827971a383822275d0e10fe3cf60418b19
-
SHA512
7d3a9d0eed6e7f141b59f8e2e3a061a7b5ecc97f8a253be92f6185040f63cbbd4a2b4f9dafa1cd6885f06ffbbbf0b316e16afe38d0ebb8dfcd70d0ab5bcbf6aa
-
SSDEEP
1536:tm/+KAh2sM93znxGxPaL9NZcmtFGBdLaAcmvtBWwfSF/yim/1y1ejY6yFOBA:K+Kz33NGxSpzdFGBsckww/yjgf6yFOB
Static task
static1
Behavioral task
behavioral1
Sample
rc72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rc72.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
-
install_file
Antivirus.exe
Targets
-
-
Target
rc72.exe
-
Size
85KB
-
MD5
7d8c06573fad926b86f5dcca4d79a938
-
SHA1
1deb1612b61a7074dba865546110e019e76d32e7
-
SHA256
b271c8c74d2f172b07adf103779729827971a383822275d0e10fe3cf60418b19
-
SHA512
7d3a9d0eed6e7f141b59f8e2e3a061a7b5ecc97f8a253be92f6185040f63cbbd4a2b4f9dafa1cd6885f06ffbbbf0b316e16afe38d0ebb8dfcd70d0ab5bcbf6aa
-
SSDEEP
1536:tm/+KAh2sM93znxGxPaL9NZcmtFGBdLaAcmvtBWwfSF/yim/1y1ejY6yFOBA:K+Kz33NGxSpzdFGBsckww/yjgf6yFOB
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1