General
-
Target
78423879243879234879423879243879342847932243897.exe
-
Size
167KB
-
Sample
250303-31yd1stmw9
-
MD5
6d9feaf76fb62e070d958c0170dc1fd9
-
SHA1
d3c9de15d3f268edc65bf0000a8bdb23d6eb8487
-
SHA256
42101b053272c4cb236c059a6a4b168b48e747d59819e28998736db1e8580f64
-
SHA512
6e28413715712aa91859d941ff3d16ca4a2a05ff745f30cf5b34cc1cb87a72b0985a4f525867a5abfc980abf75d59ce9c025e894565040a03deb40410ac68c5a
-
SSDEEP
3072:Fx9KDUpvI+bkT8wDOP1qBz65/M6If+3Js+3JFkKeTnY:F2DU9pbbqxBt25
Behavioral task
behavioral1
Sample
78423879243879234879423879243879342847932243897.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78423879243879234879423879243879342847932243897.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
45.88.91.55:8893
-
Install_directory
%ProgramData%
-
install_file
sys-32.exe
Targets
-
-
Target
78423879243879234879423879243879342847932243897.exe
-
Size
167KB
-
MD5
6d9feaf76fb62e070d958c0170dc1fd9
-
SHA1
d3c9de15d3f268edc65bf0000a8bdb23d6eb8487
-
SHA256
42101b053272c4cb236c059a6a4b168b48e747d59819e28998736db1e8580f64
-
SHA512
6e28413715712aa91859d941ff3d16ca4a2a05ff745f30cf5b34cc1cb87a72b0985a4f525867a5abfc980abf75d59ce9c025e894565040a03deb40410ac68c5a
-
SSDEEP
3072:Fx9KDUpvI+bkT8wDOP1qBz65/M6If+3Js+3JFkKeTnY:F2DU9pbbqxBt25
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1