General
-
Target
update.exe
-
Size
221KB
-
Sample
250307-tvn4qatmv4
-
MD5
c2bc3732467892cdf222c9161773405a
-
SHA1
43770742e6a28930a1cc4e415e7e03df870c9e92
-
SHA256
b6e701be7e9daca3ebad9a1586d75dfbd6ec66fd9b36b15459e9f16b73cfc3ca
-
SHA512
6c9629df3de5ee640898d7abbb4f750df3e07c9e2d841a5597072ec2bd6662de552b75dc783761c0376bf44791a2d684a01a7f387d675674d87dc83fa6762ba1
-
SSDEEP
3072:Gj+C7lQ52Mrb/xqHuXxcKXnlzlbm9EHBAnpK37nXZ8j0uIQ7bnPs074tyJhXgK0J:o77MrQO58VxnPJqta
Static task
static1
Behavioral task
behavioral1
Sample
update.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
3.0
147.185.221.26:27759
39bfHGiD4o1FzWnH
-
Install_directory
%Temp%
-
install_file
USB.exe
Targets
-
-
Target
update.exe
-
Size
221KB
-
MD5
c2bc3732467892cdf222c9161773405a
-
SHA1
43770742e6a28930a1cc4e415e7e03df870c9e92
-
SHA256
b6e701be7e9daca3ebad9a1586d75dfbd6ec66fd9b36b15459e9f16b73cfc3ca
-
SHA512
6c9629df3de5ee640898d7abbb4f750df3e07c9e2d841a5597072ec2bd6662de552b75dc783761c0376bf44791a2d684a01a7f387d675674d87dc83fa6762ba1
-
SSDEEP
3072:Gj+C7lQ52Mrb/xqHuXxcKXnlzlbm9EHBAnpK37nXZ8j0uIQ7bnPs074tyJhXgK0J:o77MrQO58VxnPJqta
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-