General
-
Target
XClient.bin.zip
-
Size
49KB
-
Sample
230802-f4w9ssdh9z
-
MD5
22845cfe6b09dc702464b0ed49aa2a92
-
SHA1
312fea82c599938e0830e7acedb915992641a2de
-
SHA256
5232f0ce645122b6dc2b7ca1cc4ac861560c7882a566d021c29293f36eab939b
-
SHA512
d2fe919b807f80d91a7999affb964890f192e44a798091af3c641e56aff28588fec45879e99ecf0ae3543d09b2b9c2dafac6ca76116e90e341e370e5c53fab25
-
SSDEEP
1536:XHAxtTNwRY64RScwD3ukvkhAA42oD88FKhG0FWd:XcmYxw6k+AA42UvFKcgu
Malware Config
Extracted
xworm
152.67.162.194:10001
-
install_file
USB.exe
Targets
-
-
Target
XClient.bin
-
Size
91KB
-
MD5
3aa1d331142179e1df0d5272093b5763
-
SHA1
0974dc44c741295a91df0578d6aa70fa590ba0af
-
SHA256
31a794b94a12a0e319d88c39fe849434c0b331b453151a9a703b1054df8308d5
-
SHA512
789c13a32161715e7eec56c59027d073290cfbd084a44c176a99ed0ca365faaabcb59e6bdaee3ac084c623a40e7c78180b7d7311b885a2a23b0e9149ce1e3583
-
SSDEEP
1536:/6Nvi4OHydrKeumNEba+YFxs+i6pB1seTnOpp2KtLP7jNXXCrg36Zl3:/6Njdm3mKbads+z1nbOp4KtRA5
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-