User tags
Assigned on submission by the user, not by sandbox detections.
General
-
Target
hello.exe
-
Size
133KB
-
Sample
230709-pmeg4adf8s
-
MD5
27d43df9fb6228ab9ec3482a528f1da6
-
SHA1
23b938e1caf2507ae797805f27ee66357ee0c53a
-
SHA256
d9048e7e5185fca63822a536674effaf47f434fd8bcd74018e5da09b5a7c1469
-
SHA512
30fb0f42d85b92102ac83dde0cadb0cdf1f19f2bafbb6174ce880aaf9c89a6dac201a3a461253543cac833fb12c5b10277bcf0c492eb2a0070e033b61ec632cc
-
SSDEEP
1536:u7K22GZXoCVg0vfiCTzbec/31ENYw649ApO4uMET1qxj751cNz0UCdkV/L7t:u7Kh+4CO0vfiC/beGCNYi9ApOZUH5aJ
Behavioral task
behavioral1
Sample
hello.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
hello.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
xworm
needforrat.hopto.org:7000
-
install_file
USB.exe
Targets
-
-
Target
hello.exe
-
Size
133KB
-
MD5
27d43df9fb6228ab9ec3482a528f1da6
-
SHA1
23b938e1caf2507ae797805f27ee66357ee0c53a
-
SHA256
d9048e7e5185fca63822a536674effaf47f434fd8bcd74018e5da09b5a7c1469
-
SHA512
30fb0f42d85b92102ac83dde0cadb0cdf1f19f2bafbb6174ce880aaf9c89a6dac201a3a461253543cac833fb12c5b10277bcf0c492eb2a0070e033b61ec632cc
-
SSDEEP
1536:u7K22GZXoCVg0vfiCTzbec/31ENYw649ApO4uMET1qxj751cNz0UCdkV/L7t:u7Kh+4CO0vfiC/beGCNYi9ApOZUH5aJ
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-