General
-
Target
ExcellentLoader.exe
-
Size
78KB
-
Sample
250303-tj6jmasky9
-
MD5
066dd41fdaee5a783bb23b84d5f5559e
-
SHA1
7b5ef0ad6d6a65184d300f616a1036c1476bc841
-
SHA256
b8318093edf9177163087e7eff4c7c8b7efa73f069a95c8e468ab30049beb36f
-
SHA512
956d42e02dcdb7dc68a7c1bf3ee921caf26adf8f52b9795f7b17f6dbbf7d63fcb2919c7d395e99d5e7344eb93e2103b45f672907e9abbeb69d198b8f8b60fa80
-
SSDEEP
1536:mmpxP0+g9rIcT4HF6vhjfIn8zG+bdbIXXF1HM66gJoOiJEJkZyglk:WI6tS8K+bdUzLyOYEewglk
Behavioral task
behavioral1
Sample
ExcellentLoader.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
ExcellentLoader.exe
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
xworm
all-advocacy.gl.at.ply.gg:33270
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
ExcellentLoader.exe
-
Size
78KB
-
MD5
066dd41fdaee5a783bb23b84d5f5559e
-
SHA1
7b5ef0ad6d6a65184d300f616a1036c1476bc841
-
SHA256
b8318093edf9177163087e7eff4c7c8b7efa73f069a95c8e468ab30049beb36f
-
SHA512
956d42e02dcdb7dc68a7c1bf3ee921caf26adf8f52b9795f7b17f6dbbf7d63fcb2919c7d395e99d5e7344eb93e2103b45f672907e9abbeb69d198b8f8b60fa80
-
SSDEEP
1536:mmpxP0+g9rIcT4HF6vhjfIn8zG+bdbIXXF1HM66gJoOiJEJkZyglk:WI6tS8K+bdUzLyOYEewglk
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-