General
-
Target
SystemSettings.rar
-
Size
130KB
-
Sample
250306-sltgeaskv4
-
MD5
cfd1e38ba89d12c7dcb31f7fcc688064
-
SHA1
2d3ee0fa93877e850e625ed3e5f18d3dea70e167
-
SHA256
3e29a57bde610ff61c422796b89fc4332f265cc50e966593fc2b00bb23a13a21
-
SHA512
326ac74f3a27163d591193e323bb84e1ae10bd22ea2fe323c414265e66c5a720f271b8f4de8039989920aeb5937c5b1fdba03d0328427ef94bfee41101064c7f
-
SSDEEP
3072:nrURbAWbGvrMy06g8CdSgtapOYkJGJE+/7thDG/3yWitioCwnk:ObAW1yB7mSgtaEuEyhJlk
Static task
static1
Malware Config
Extracted
xworm
5.0
uoqo0jDHykn623lG
-
Install_directory
%Public%
-
install_file
SystemSettings.exe
-
pastebin_url
https://pastebin.com/raw/4zaiEtZS
-
telegram
https://api.telegram.org/bot8175192176:AAHZuZ0-rHS66YSwsvh8-gQjbZYSbY3IyXo/sendMessage?chat_id=7537927256
Targets
-
-
Target
SystemSettings.rar
-
Size
130KB
-
MD5
cfd1e38ba89d12c7dcb31f7fcc688064
-
SHA1
2d3ee0fa93877e850e625ed3e5f18d3dea70e167
-
SHA256
3e29a57bde610ff61c422796b89fc4332f265cc50e966593fc2b00bb23a13a21
-
SHA512
326ac74f3a27163d591193e323bb84e1ae10bd22ea2fe323c414265e66c5a720f271b8f4de8039989920aeb5937c5b1fdba03d0328427ef94bfee41101064c7f
-
SSDEEP
3072:nrURbAWbGvrMy06g8CdSgtapOYkJGJE+/7thDG/3yWitioCwnk:ObAW1yB7mSgtaEuEyhJlk
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-