General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1337991571500568716/1347929751221833809/TESTT.exe?ex=67cd9ce8&is=67cc4b68&hm=ddb1e26b0afd306f4ffaf8a5ab670be3407a8bb8f599ebd5896c9466c18de40c&
Resource
win10ltsc2021-20250217-en
19 signatures
300 seconds
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%port%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/cSnNDAPb
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1337991571500568716/1347929751221833809/TESTT.exe?ex=67cd9ce8&is=67cc4b68&hm=ddb1e26b0afd306f4ffaf8a5ab670be3407a8bb8f599ebd5896c9466c18de40c&
-
Detect Xworm Payload
-
Xworm family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-