General
-
Target
Excellent2.0.exe
-
Size
77KB
-
Sample
250304-qqqvza1vhz
-
MD5
fa9dbd782dfb5bf2f278c4bc6a73279e
-
SHA1
dc01ceae67b4983111677b421691903a6eba150b
-
SHA256
40d127a2d334e18d6e80801667a5d1e356f8c8a142563e360ab4f15796737428
-
SHA512
dc0a3c67ea86b7dba4016800ddb03c27cc87932fe9244658675c470c3cb8b41f6fb1d1fe87feaef60acc80d65de26ba3ea5e100382bfbdf9c8e6829c5c1c3c04
-
SSDEEP
1536:rdxon/N6GtnKEc2wP8UiQksF+bVMp23aYkFDoPjPT6HMXkzf2YyjjmO82C3hk:gnF6GtnKTB0Ckk+bVMS9TXU+biO8x3hk
Behavioral task
behavioral1
Sample
Excellent2.0.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
africa-wins.gl.at.ply.gg:41663
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
Excellent2.0.exe
-
Size
77KB
-
MD5
fa9dbd782dfb5bf2f278c4bc6a73279e
-
SHA1
dc01ceae67b4983111677b421691903a6eba150b
-
SHA256
40d127a2d334e18d6e80801667a5d1e356f8c8a142563e360ab4f15796737428
-
SHA512
dc0a3c67ea86b7dba4016800ddb03c27cc87932fe9244658675c470c3cb8b41f6fb1d1fe87feaef60acc80d65de26ba3ea5e100382bfbdf9c8e6829c5c1c3c04
-
SSDEEP
1536:rdxon/N6GtnKEc2wP8UiQksF+bVMp23aYkFDoPjPT6HMXkzf2YyjjmO82C3hk:gnF6GtnKTB0Ckk+bVMS9TXU+biO8x3hk
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-