General
-
Target
dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d.exe
-
Size
277KB
-
Sample
250305-ee1p9ayjv8
-
MD5
d1458dc39b290683cefbb01cc5b0991a
-
SHA1
e9749971be9d943cb2a62e2be5eb442161876ec6
-
SHA256
dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d
-
SHA512
f90bc037576ee1205fa260d5b6b05c95f930025bc40f541b92f39b845b8e9a90a59ec18ef0be1ab5cf7bb74ed6a6222fc1a882df894ba8e1e722d671aef37e35
-
SSDEEP
6144:mncN0em3ZxfIiz1uE9FT6gLc/wtgdmvRvtsUuVGh+/Kq3u:P0dfJ8E9d6gLMaDvzsVu+d+
Static task
static1
Behavioral task
behavioral1
Sample
dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d.exe
-
Size
277KB
-
MD5
d1458dc39b290683cefbb01cc5b0991a
-
SHA1
e9749971be9d943cb2a62e2be5eb442161876ec6
-
SHA256
dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d
-
SHA512
f90bc037576ee1205fa260d5b6b05c95f930025bc40f541b92f39b845b8e9a90a59ec18ef0be1ab5cf7bb74ed6a6222fc1a882df894ba8e1e722d671aef37e35
-
SSDEEP
6144:mncN0em3ZxfIiz1uE9FT6gLc/wtgdmvRvtsUuVGh+/Kq3u:P0dfJ8E9d6gLMaDvzsVu+d+
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1