General
-
Target
fatality-password-123 (123).zip
-
Size
29.2MB
-
Sample
250306-na5yvaw1bw
-
MD5
2d41ff52dc1e52d1cd699ca40a167b53
-
SHA1
66d124bff088f410081c80e127562f3f811c745d
-
SHA256
3078fd49e34b13f710f0b4d15b48f412ca8e5bbd7e6f9b9266cb29af0e0c37b9
-
SHA512
8fea200e6104e181138c4d5678adad53c6c92bbf02961470c05e9d9d50533462811a246cbb0e8a64174d6077059bcb99896d1d1fae9a62fb026890a20b914753
-
SSDEEP
786432:NkwzyLl3US+vSuB80vutpvHxTQXcF3T8QhjavVMNn7gJCtm9n:Nke2l3iSe800PewhuvKn0JCSn
Behavioral task
behavioral1
Sample
fatality-password-123 (123).zip
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
22.ip.gl.ply.gg:35699
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7993755657:AAFO640EjOsY8e2cOR8daPzBSHn1uGW4C9s/sendMessage?chat_id=6749074492
Targets
-
-
Target
fatality-password-123 (123).zip
-
Size
29.2MB
-
MD5
2d41ff52dc1e52d1cd699ca40a167b53
-
SHA1
66d124bff088f410081c80e127562f3f811c745d
-
SHA256
3078fd49e34b13f710f0b4d15b48f412ca8e5bbd7e6f9b9266cb29af0e0c37b9
-
SHA512
8fea200e6104e181138c4d5678adad53c6c92bbf02961470c05e9d9d50533462811a246cbb0e8a64174d6077059bcb99896d1d1fae9a62fb026890a20b914753
-
SSDEEP
786432:NkwzyLl3US+vSuB80vutpvHxTQXcF3T8QhjavVMNn7gJCtm9n:Nke2l3iSe800PewhuvKn0JCSn
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-