General
-
Target
XClient.exe
-
Size
48KB
-
Sample
230719-gz6s4sha2s
-
MD5
a7a334622f9ff26d3ca6afa743baac24
-
SHA1
f407495af0552120eb2448c118ce00e9367f7e32
-
SHA256
e476bdc9ffb005aa645bdfa8964923edcda8b5028b57756bb041ad9732c56b31
-
SHA512
ccd79667da5fbc94ff3139119535c25230fdc2ed0ff8d6c278630e92182b7708d3691f991470d69d2be0919f3a2cac28c965c53b496a166d0ccb94c0f4c77b26
-
SSDEEP
768:3LOGhVBuiuD69qUbO93heX6LnMUm7pr1B/+2VpeHbR6TFjS1vZvMTOQhXrVFFhN:6dWbO9IXmqpabR6ZjS3ETOQhN
Malware Config
Extracted
xworm
common-pharmacies.craft.ply.gg:39818
-
install_file
spoolsv.exe
Targets
-
-
Target
XClient.exe
-
Size
48KB
-
MD5
a7a334622f9ff26d3ca6afa743baac24
-
SHA1
f407495af0552120eb2448c118ce00e9367f7e32
-
SHA256
e476bdc9ffb005aa645bdfa8964923edcda8b5028b57756bb041ad9732c56b31
-
SHA512
ccd79667da5fbc94ff3139119535c25230fdc2ed0ff8d6c278630e92182b7708d3691f991470d69d2be0919f3a2cac28c965c53b496a166d0ccb94c0f4c77b26
-
SSDEEP
768:3LOGhVBuiuD69qUbO93heX6LnMUm7pr1B/+2VpeHbR6TFjS1vZvMTOQhXrVFFhN:6dWbO9IXmqpabR6ZjS3ETOQhN
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-