General
-
Target
Output.exe
-
Size
127KB
-
Sample
250307-vtkkkstrw8
-
MD5
c5a8c92a6eae175507942fcdb7b6f4d7
-
SHA1
b75512ae6d1da96e091a657deb49f6047e696bb4
-
SHA256
59ae3f7403be6eb6d175e19fccc41998188e27419b4f1e3bc9e2e36f123fc36a
-
SHA512
0796a4886d9e0f078f9a6a1e324cdfbbbfde1a991e2c2be4d764db12980f8b4b6ca743d707a1561587df4dc9d78fb71bf17cb21d3e886e1ccee28a913c44f592
-
SSDEEP
3072:e274NpVq8BxFRzaqF+o2GQJ7/JzqVfGv2:eegVqwlL
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
show-commentary.gl.at.ply.gg:19243
TJBpUvAwYAstsP7U
-
install_file
USB.exe
Targets
-
-
Target
Output.exe
-
Size
127KB
-
MD5
c5a8c92a6eae175507942fcdb7b6f4d7
-
SHA1
b75512ae6d1da96e091a657deb49f6047e696bb4
-
SHA256
59ae3f7403be6eb6d175e19fccc41998188e27419b4f1e3bc9e2e36f123fc36a
-
SHA512
0796a4886d9e0f078f9a6a1e324cdfbbbfde1a991e2c2be4d764db12980f8b4b6ca743d707a1561587df4dc9d78fb71bf17cb21d3e886e1ccee28a913c44f592
-
SSDEEP
3072:e274NpVq8BxFRzaqF+o2GQJ7/JzqVfGv2:eegVqwlL
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-