General
-
Target
https://docs.google.com/uc?export=download&id=1ppq1srLUQDyFV5XTi1Lz4FPvCkBZQ-Zb
-
Sample
250305-1rkepazwcz
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/uc?export=download&id=1ppq1srLUQDyFV5XTi1Lz4FPvCkBZQ-Zb
Resource
win10v2004-20250217-en
21 signatures
150 seconds
Malware Config
Extracted
Family
xworm
Version
5.0
C2
213.209.143.123:1458
Mutex
EZZZ5HgfKx6ZqBg1
Attributes
-
install_file
USB.exe
aes.plain
Targets
-
-
Target
https://docs.google.com/uc?export=download&id=1ppq1srLUQDyFV5XTi1Lz4FPvCkBZQ-Zb
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1