General
-
Target
Anarchy Panel 4.7.zip
-
Size
57.2MB
-
Sample
250419-v5mjbassgy
-
MD5
f13bc330083490c9ca567a79fe547b63
-
SHA1
7ae4f71eb33117560549edfd72561690f5b7eefe
-
SHA256
724d909c4a7ebcc801556a07515580cc5b94835b679025dfd2e93ae4daa52a6e
-
SHA512
72bb8c25e42d129fe5629558daca81063f44595b6b537f7a89d5dcd714aa80ae6b9506c9535dc15d8ff1b7a3c93c4efd682fa24d3f93e80101a0180400d67e27
-
SSDEEP
1572864:mEoS2u5sfIxy4ZMqSTalcSthTv9mMior/Tx:JoS2u5WXuRZDzxiOx
Malware Config
Extracted
xworm
146.190.110.91:3389
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7023899363:AAFEzgbfWzhyE32Lf95TKSRYEYXMd4AfMyk/sendMessage?chat_id=6354844663
Targets
-
-
Target
Anarchy Panel.exe
-
Size
49.4MB
-
MD5
74d39916f4ebbfcdee4cf195e46077ad
-
SHA1
fbcf304987a10dbe39a2960d159925ea58fbb81b
-
SHA256
2e573c63103eff21009151b8b8873bd8d3f4e2d652ecc5166318f46a5c5459e2
-
SHA512
f2f6cedda76f7d2f9284ad39a755a197ad4ce65b05365275f9317c51ec5dc9d82633cf87d4daf0ff0182fd128aa12941f88da9f91b57245955c8550d42fd9b42
-
SSDEEP
786432:Lvr2wDJKwdqdue40MYj5l6EkkOPF2gIToqgSOKGPzN9qCoaByOy:Lj2hoiTM651kZ0gIToFSO9PzN9qUyO
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-