General
-
Target
XCliefghfghfghnt.exe
-
Size
40KB
-
Sample
240428-gd82cahe21
-
MD5
c0f78a4a36fe6b44cfbee7d9a9fb9510
-
SHA1
4455ca2f580196c82e10eade60ace724bdc0b5bc
-
SHA256
95494d2739b808181796b13c85f7c6327a41d530f8701f03b924daf1b497e1c3
-
SHA512
5b434ff58d2f404e9df43e8fa2708a9b90c237046c870db87f419d1b726a5946d60321ba02ae69449b1c6cfdc00df317fdb9bd93fd1c3d99a8a9d847159b3186
-
SSDEEP
768:k55XvtTKnCVrAmJRXFuO5tF5PT95OBOMhT3Ev:kMCdAmJ1FuOLFx95SOM9g
Behavioral task
behavioral1
Sample
XCliefghfghfghnt.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
XCliefghfghfghnt.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:38630
147.185.221.19:38630
bay-currencies.gl.at.ply.gg:38630
and-organized.gl.at.ply.gg:38630
community-excess.gl.at.ply.gg:38630
fTpGRWnrShtm0zhA
-
Install_directory
%AppData%
-
install_file
runbroker.exe
Targets
-
-
Target
XCliefghfghfghnt.exe
-
Size
40KB
-
MD5
c0f78a4a36fe6b44cfbee7d9a9fb9510
-
SHA1
4455ca2f580196c82e10eade60ace724bdc0b5bc
-
SHA256
95494d2739b808181796b13c85f7c6327a41d530f8701f03b924daf1b497e1c3
-
SHA512
5b434ff58d2f404e9df43e8fa2708a9b90c237046c870db87f419d1b726a5946d60321ba02ae69449b1c6cfdc00df317fdb9bd93fd1c3d99a8a9d847159b3186
-
SSDEEP
768:k55XvtTKnCVrAmJRXFuO5tF5PT95OBOMhT3Ev:kMCdAmJ1FuOLFx95SOM9g
Score10/10-
Detect Xworm Payload
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-