General
-
Target
NHCUR_BootstrapperNew.exe
-
Size
2.9MB
-
Sample
250304-1enata1xbv
-
MD5
8f4833925c458ee2c6b40ef0e0b978f0
-
SHA1
f37823826806dfe3ab30f6f92ee9807ca3265332
-
SHA256
2da50060f34dbe8ae3cb42988efbe40546eba522f090958013b3e47178aa04c7
-
SHA512
88b81b3d204b6ef0234740a0795659f6a924b5106a80cac8d4d174a48003285b395598952de6c03075f15b3cf1055d86d3e604b1346eb8285f098dc71f0e4e97
-
SSDEEP
49152:8gnJGTce2a1Qo0JjdjW62omu2pCoXghq86WKAlQAd882TQaa0t/s/LAZ42Q:tE4eBOo0JjdjpJcNA9882kJbMC
Static task
static1
Behavioral task
behavioral1
Sample
NHCUR_BootstrapperNew.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NHCUR_BootstrapperNew.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
-
Install_directory
%port%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/GMv8QPCE
Targets
-
-
Target
NHCUR_BootstrapperNew.exe
-
Size
2.9MB
-
MD5
8f4833925c458ee2c6b40ef0e0b978f0
-
SHA1
f37823826806dfe3ab30f6f92ee9807ca3265332
-
SHA256
2da50060f34dbe8ae3cb42988efbe40546eba522f090958013b3e47178aa04c7
-
SHA512
88b81b3d204b6ef0234740a0795659f6a924b5106a80cac8d4d174a48003285b395598952de6c03075f15b3cf1055d86d3e604b1346eb8285f098dc71f0e4e97
-
SSDEEP
49152:8gnJGTce2a1Qo0JjdjW62omu2pCoXghq86WKAlQAd882TQaa0t/s/LAZ42Q:tE4eBOo0JjdjpJcNA9882kJbMC
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-