General
-
Target
XwormLoader.exe
-
Size
7.8MB
-
Sample
250306-1q36eayp15
-
MD5
239e4c2d3e6553ad53ccc6172a6a11b8
-
SHA1
f7313274cc27c47ca78a476541e0e30e84c4dcbc
-
SHA256
fb05744e6285d0d7eaff70f7b303eb04ed24080af8c31e83b7da0bae16e2c216
-
SHA512
76cce7ec3788db10a1886a27b862f5203c0c8d4294b79efb4512442d8b817be3ea3fb9777e5bacff90e38f14c84a60e319cff23e028dbd9567f4913d94b137f3
-
SSDEEP
196608:7//b4C6XrL5HfZBEhl3xZi5OslC9+PWbXooVl41u1mMFsr3:7/yvRZBEP3xZi5Oso+PWbXooL4Sa3
Static task
static1
Malware Config
Extracted
xworm
5.0
217.195.153.81:50000
5UXpujbt6vWtkdEG
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Targets
-
-
Target
XwormLoader.exe
-
Size
7.8MB
-
MD5
239e4c2d3e6553ad53ccc6172a6a11b8
-
SHA1
f7313274cc27c47ca78a476541e0e30e84c4dcbc
-
SHA256
fb05744e6285d0d7eaff70f7b303eb04ed24080af8c31e83b7da0bae16e2c216
-
SHA512
76cce7ec3788db10a1886a27b862f5203c0c8d4294b79efb4512442d8b817be3ea3fb9777e5bacff90e38f14c84a60e319cff23e028dbd9567f4913d94b137f3
-
SSDEEP
196608:7//b4C6XrL5HfZBEhl3xZi5OslC9+PWbXooVl41u1mMFsr3:7/yvRZBEP3xZi5Oso+PWbXooL4Sa3
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-