General
-
Target
ExcellentSkin.exe
-
Size
65KB
-
Sample
250303-tjaf7askv9
-
MD5
cd3ab4a2a69f0dbb8082710cd27734b4
-
SHA1
a8c759c3e080738081272896e0f263f9e39de98b
-
SHA256
dbe5501ab97362e220ae913a75b6f251a1d890971cf2a962b0f7248ec7808daf
-
SHA512
c7fdba39ba403b53fc4baaeab276a89eccddc7477b2c057f17f943be135da59bc70e1b4574bc1d22290a27497051a56bee177e58178aa1b176813e50688215ca
-
SSDEEP
1536:yLtIgPGIjoghF5YX5JCFU+b7wnzMSIM4Y6lPUhWUONrogIk0Zk:YIgSgh3I5JCG+b7A8UOtJ0Zk
Behavioral task
behavioral1
Sample
ExcellentSkin.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
all-advocacy.gl.at.ply.gg:33270
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
ExcellentSkin.exe
-
Size
65KB
-
MD5
cd3ab4a2a69f0dbb8082710cd27734b4
-
SHA1
a8c759c3e080738081272896e0f263f9e39de98b
-
SHA256
dbe5501ab97362e220ae913a75b6f251a1d890971cf2a962b0f7248ec7808daf
-
SHA512
c7fdba39ba403b53fc4baaeab276a89eccddc7477b2c057f17f943be135da59bc70e1b4574bc1d22290a27497051a56bee177e58178aa1b176813e50688215ca
-
SSDEEP
1536:yLtIgPGIjoghF5YX5JCFU+b7wnzMSIM4Y6lPUhWUONrogIk0Zk:YIgSgh3I5JCG+b7A8UOtJ0Zk
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-