General
-
Target
sample
-
Size
3KB
-
Sample
250308-vghv8azny8
-
MD5
8f42ccb443b9a6b53c6dc09a7eb26775
-
SHA1
2349df6e48fcba4e6b8994403d01f3f02899e200
-
SHA256
3f5996cd1014590af1a91a9b3c711cdefaabcb93e8b7399ebb801cc7f7cee762
-
SHA512
2621d678cf76c61e1c800e3b03706423840d6a93f22b7945364a43c441b43fe3a2ab34a040102fa36c082bc7730395fdef2dc5db2ebae5efa844ffa89ebe77fa
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:7000
-
Install_directory
%AppData%
-
install_file
Vlc Runtime.exe
Targets
-
-
Target
sample
-
Size
3KB
-
MD5
8f42ccb443b9a6b53c6dc09a7eb26775
-
SHA1
2349df6e48fcba4e6b8994403d01f3f02899e200
-
SHA256
3f5996cd1014590af1a91a9b3c711cdefaabcb93e8b7399ebb801cc7f7cee762
-
SHA512
2621d678cf76c61e1c800e3b03706423840d6a93f22b7945364a43c441b43fe3a2ab34a040102fa36c082bc7730395fdef2dc5db2ebae5efa844ffa89ebe77fa
-
Detect Xworm Payload
-
Xworm family
-
Download via BitsAdmin
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-