General
-
Target
Proton Release V1.1.exe
-
Size
8.5MB
-
Sample
240629-qwcwas1glr
-
MD5
0f158e3126ea5bb67c5a8fb4d63fe8cb
-
SHA1
bc38cd05e556ffc54fa53cf700ca77df2cab5b9e
-
SHA256
89c6adcac801f50d168c651eff356ea62355a4b76fc06d386665f0af38418bb5
-
SHA512
6f241f2ddbb87b664adaeef7c9322514cfcaeabc0661a67b37dd0bdc2cce5ae3b70938e0d1643983f09d01ebb9977dabceb64f229b8d936d8a82f1a803ce97cf
-
SSDEEP
196608:4OsDeh76oe1vFy4w7LT/Iy5NoFAxLsgWCOqAIiCL2oeYbl7Cdvb8lDB9tfimcPDL:4OsDkWp/y4w7LjIyHoWle9+LeYblUgZv
Static task
static1
Behavioral task
behavioral1
Sample
Proton Release V1.1.exe
Resource
win7-20240611-en
Malware Config
Extracted
xworm
91.92.241.69:5555
-
Install_directory
%ProgramData%
-
install_file
PhoneLink.exe
Targets
-
-
Target
Proton Release V1.1.exe
-
Size
8.5MB
-
MD5
0f158e3126ea5bb67c5a8fb4d63fe8cb
-
SHA1
bc38cd05e556ffc54fa53cf700ca77df2cab5b9e
-
SHA256
89c6adcac801f50d168c651eff356ea62355a4b76fc06d386665f0af38418bb5
-
SHA512
6f241f2ddbb87b664adaeef7c9322514cfcaeabc0661a67b37dd0bdc2cce5ae3b70938e0d1643983f09d01ebb9977dabceb64f229b8d936d8a82f1a803ce97cf
-
SSDEEP
196608:4OsDeh76oe1vFy4w7LT/Iy5NoFAxLsgWCOqAIiCL2oeYbl7Cdvb8lDB9tfimcPDL:4OsDkWp/y4w7LjIyHoWle9+LeYblUgZv
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1