General
-
Target
XClient.exe
-
Size
55KB
-
Sample
230807-vn35qsgf36
-
MD5
a10ca252aac3f3b1d7d4e11bcf9b08e9
-
SHA1
b960c51b4047c155fccdc60e535cebcc446542fb
-
SHA256
2e497a902a5ade2b211974bd43c3be9689b64c7f9896aebe7c249f08a5dd44a2
-
SHA512
fcfda0f804cb5f0b0325c4ca67172b68ecf6c4fe06c3854b7d091a754ee24a355ef723bf0ac4317263415426ad0f76c888917708b17b5ed5103520dc866fb164
-
SSDEEP
1536:pEGX0joWEkDkAHnjtM63b5SE8I586LOh6aTqn2m:pEGX0joWTkABMEb5SUO3q2m
Behavioral task
behavioral1
Sample
XClient.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
XClient.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
xworm
modified-trap.gl.at.ply.gg:18371
-
install_file
USB.exe
Targets
-
-
Target
XClient.exe
-
Size
55KB
-
MD5
a10ca252aac3f3b1d7d4e11bcf9b08e9
-
SHA1
b960c51b4047c155fccdc60e535cebcc446542fb
-
SHA256
2e497a902a5ade2b211974bd43c3be9689b64c7f9896aebe7c249f08a5dd44a2
-
SHA512
fcfda0f804cb5f0b0325c4ca67172b68ecf6c4fe06c3854b7d091a754ee24a355ef723bf0ac4317263415426ad0f76c888917708b17b5ed5103520dc866fb164
-
SSDEEP
1536:pEGX0joWEkDkAHnjtM63b5SE8I586LOh6aTqn2m:pEGX0joWTkABMEb5SUO3q2m
Score10/10-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-