General
-
Target
PJsPp3e.exe
-
Size
43KB
-
Sample
250406-np3r2azms3
-
MD5
ea69167000ca8cd93a6f327c19a1c7c9
-
SHA1
2af8e932bd1a6bf0c0074ef98e12bc34c26f8994
-
SHA256
73c6fa2e52043649f60d92324da6b3668553539f4c6b43f595e4e093f7883934
-
SHA512
5291d96024760668e525b2ef97b8b41f83d94d15911acbf1b82b970a1d5a8647fe78a779df46c83bac2a471b7fbd512942aa841d680447e63af8a4db0735d3c9
-
SSDEEP
768:tlqRZ9SFb+U89ORdtwDTUF59EWlOChlf9dTsL:tERZ9q1HtgQF59EWlOC7VlsL
Behavioral task
behavioral1
Sample
PJsPp3e.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:6666
5.180.155.29:6666
QPPP7ypX2vFWlxk3
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot8016176478:AAGVLtLncU8-ZLd-P86FqeQzAOXJybu2R9g/sendMessage?chat_id=5165347769
Targets
-
-
Target
PJsPp3e.exe
-
Size
43KB
-
MD5
ea69167000ca8cd93a6f327c19a1c7c9
-
SHA1
2af8e932bd1a6bf0c0074ef98e12bc34c26f8994
-
SHA256
73c6fa2e52043649f60d92324da6b3668553539f4c6b43f595e4e093f7883934
-
SHA512
5291d96024760668e525b2ef97b8b41f83d94d15911acbf1b82b970a1d5a8647fe78a779df46c83bac2a471b7fbd512942aa841d680447e63af8a4db0735d3c9
-
SSDEEP
768:tlqRZ9SFb+U89ORdtwDTUF59EWlOChlf9dTsL:tERZ9q1HtgQF59EWlOC7VlsL
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1