General
-
Target
true.exe
-
Size
330KB
-
Sample
240124-vwszqsecb9
-
MD5
9c7e29c46aeea4af73bf5382f1b0bcf4
-
SHA1
2568ab3b2dd12fdfa9e4b2cd788b97106df1071e
-
SHA256
8599a5c62399e298ef5b855dc06d1163e3baaf8599520826af516c8ffd53bfb1
-
SHA512
1cc7f710b203f03ab64ef563eb3093ccb2e2c8beb5ea565e153fed5093e3a0583c525b06b9a1154f31ebaaf848d1f575f7c5738b5d8b6ff44d3c544a0eb8bb81
-
SSDEEP
3072:9sBTZQFLWx8MzI4IXoSuF/q9Q50t1YAQHmxqHd4HtMUsFTAG5bM:9sLQUxTI4IXo3F9GIGM2H2Us
Static task
static1
Behavioral task
behavioral1
Sample
true.exe
Resource
win7-20231129-en
Malware Config
Extracted
xworm
5.0
Targets
-
-
Target
true.exe
-
Size
330KB
-
MD5
9c7e29c46aeea4af73bf5382f1b0bcf4
-
SHA1
2568ab3b2dd12fdfa9e4b2cd788b97106df1071e
-
SHA256
8599a5c62399e298ef5b855dc06d1163e3baaf8599520826af516c8ffd53bfb1
-
SHA512
1cc7f710b203f03ab64ef563eb3093ccb2e2c8beb5ea565e153fed5093e3a0583c525b06b9a1154f31ebaaf848d1f575f7c5738b5d8b6ff44d3c544a0eb8bb81
-
SSDEEP
3072:9sBTZQFLWx8MzI4IXoSuF/q9Q50t1YAQHmxqHd4HtMUsFTAG5bM:9sLQUxTI4IXo3F9GIGM2H2Us
Score10/10-
An infostealer written in Python and packaged with PyInstaller.
-
Detect Xworm Payload
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-