General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ek4o/fake-exodus/releases/tag/ekoTools
Resource
win10v2004-20250217-en
27 signatures
900 seconds
Malware Config
Extracted
Family
xworm
Version
5.0
C2
137.184.74.73:5000
Mutex
Y2rnj2CSRObOXXLb
Attributes
-
Install_directory
%ProgramData%
-
install_file
System.exe
aes.plain
Targets
-
-
Target
https://github.com/ek4o/fake-exodus/releases/tag/ekoTools
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-