General
-
Target
Dropper (infected).zip
-
Size
97.8MB
-
Sample
250306-m5nsdawygz
-
MD5
f9ee5bf8fae4aa5658b763c5ce0c9242
-
SHA1
96017dc377cd35713c93d4d6b219a4c051e6b84f
-
SHA256
992e1b04e74323754e32bbbe30ea47a14d0c9f2f99d6502de74b2717afa11d96
-
SHA512
31f3e9f6e2ad41a45c26f5ed540c598ca38d674e682dc3ec35cf3bf57772e1399e06c1b49d39167ea08a456d916d106c3e60384ffa33976b5b543fcc494b6dbf
-
SSDEEP
1572864:sphvKBNwglDlQe3AN52BMyt5meS8XnAIWsVSJkfpKr4G464w2j/EAigkXDhk:sphvKHwglDlve2atQjt+kyL2EAHkThk
Static task
static1
Behavioral task
behavioral1
Sample
PDQ.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
https://envs.sh/E3L.exe
Extracted
xworm
abstract-respond.gl.at.ply.gg:32953
-
Install_directory
%ProgramData%
-
install_file
Windows Defender.exe
Targets
-
-
Target
PDQ.exe
-
Size
98.0MB
-
MD5
be2b5bf1035e68a780e62b0144f02f53
-
SHA1
0bc89eb756819cf816f52b2378ad7243dce0f65a
-
SHA256
98a48e68768486746f7eec87a16cebd0021d2e885a6b68b2574407898cb04457
-
SHA512
59b6386acae2299cf72e5ff3114bff013bb97f4d8f3b8388825acc7d681519b7f7a5854048b3855fa84af2914811947827cb49f6998d7a285341a3abdeda7642
-
SSDEEP
3145728:oHhFswX+P6BJOTM8bk8KxJkagkCI/8rd2:oHROP6BalkkadbSU
-
Detect Xworm Payload
-
Xmrig family
-
Xworm family
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Scheduled Task/Job
1Scheduled Task
1