General
-
Target
NerestCrack.exe
-
Size
15.0MB
-
Sample
250304-szvlmatrx9
-
MD5
8acd2d51225c26977b7a6c05133b5d0e
-
SHA1
f7e78fced38d5cf695a1fc5babbc0087e4c82682
-
SHA256
233b4e09ce8f93d5b8d05fe966b6dee0e8f72a4b044c1f81cb76ab38c840ce7e
-
SHA512
71e679fda369fbbf169892c9cfca555bc5d4746292fc78f4207f15ef041bcb7f67a46061688e5dfc2bda3dba54cc064e84c652b58bef1e4114a4dedf03161662
-
SSDEEP
3072:1jx5U/FRxkan+bgVkvQ2rObGUzaewwQU4OHRemS0:Bx5iWa+b5IjzBuU4OIm
Static task
static1
Behavioral task
behavioral1
Sample
NerestCrack.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:30067
florida-leather.gl.at.ply.gg:30067
than-behavioral.gl.at.ply.gg:30067
Targets
-
-
Target
NerestCrack.exe
-
Size
15.0MB
-
MD5
8acd2d51225c26977b7a6c05133b5d0e
-
SHA1
f7e78fced38d5cf695a1fc5babbc0087e4c82682
-
SHA256
233b4e09ce8f93d5b8d05fe966b6dee0e8f72a4b044c1f81cb76ab38c840ce7e
-
SHA512
71e679fda369fbbf169892c9cfca555bc5d4746292fc78f4207f15ef041bcb7f67a46061688e5dfc2bda3dba54cc064e84c652b58bef1e4114a4dedf03161662
-
SSDEEP
3072:1jx5U/FRxkan+bgVkvQ2rObGUzaewwQU4OHRemS0:Bx5iWa+b5IjzBuU4OIm
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-