General
-
Target
Geeks ImageGen.exe
-
Size
68.0MB
-
Sample
250307-xfajkavtbv
-
MD5
cb29bd3cfb4d250b5a08df713f6edf34
-
SHA1
f588f2ae86adc8196478f96168737eb75b637631
-
SHA256
e4804942a52aca3b6e338992f966e4c756028c9b323427bd3383f95286257133
-
SHA512
dad1c969695af9736d64dec8159949b3032e8208b2566d28cfce57436b1ab72db05f77914986639de409eb675deb5599b6f84f65e560335ba81f6f22217fc1fc
-
SSDEEP
1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfowiO:v7DhdC6kzWypvaQ0FxyNTBfo
Static task
static1
Behavioral task
behavioral1
Sample
Geeks ImageGen.exe
Resource
win7-20250207-en
Malware Config
Extracted
xworm
SynoACOUSTIC-48269.portmap.host:48269
-
Install_directory
%LocalAppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7851532344:AAE8qkSFZrbQrajpw8LiT-zsdIxuZ0SFaso
Targets
-
-
Target
Geeks ImageGen.exe
-
Size
68.0MB
-
MD5
cb29bd3cfb4d250b5a08df713f6edf34
-
SHA1
f588f2ae86adc8196478f96168737eb75b637631
-
SHA256
e4804942a52aca3b6e338992f966e4c756028c9b323427bd3383f95286257133
-
SHA512
dad1c969695af9736d64dec8159949b3032e8208b2566d28cfce57436b1ab72db05f77914986639de409eb675deb5599b6f84f65e560335ba81f6f22217fc1fc
-
SSDEEP
1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfowiO:v7DhdC6kzWypvaQ0FxyNTBfo
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1