General
-
Target
inector.exe
-
Size
3.5MB
-
Sample
240225-fc5rvsce3t
-
MD5
683ee2bcce033399ae4c454930480ff5
-
SHA1
d1a7faf1a4d588167e68e42f4bda34b603977fce
-
SHA256
93121a3d21caa5ba8d96be1ecaa50bfdff617f1bc7584d2f429b1ef924b09dcd
-
SHA512
4cb065282d60a8abf5d1be779113fae88e27c2e619ae26b797a221bc117cbce7d7f55d270cb778b97de72b67602f99f28f194ac02c47701110aca7adaa9ad49d
-
SSDEEP
98304:Cmh0/gvY+Y6ix4HxJA79QqksfsJNGrsKZ0rz/1g:C2w+9ix4kvSqOm
Static task
static1
Behavioral task
behavioral1
Sample
inector.exe
Resource
win7-20240220-en
Malware Config
Extracted
xworm
5.0
properties-reasonable.gl.at.ply.gg:55832
kot6q2EiakZxmsjW
-
install_file
USB.exe
Targets
-
-
Target
inector.exe
-
Size
3.5MB
-
MD5
683ee2bcce033399ae4c454930480ff5
-
SHA1
d1a7faf1a4d588167e68e42f4bda34b603977fce
-
SHA256
93121a3d21caa5ba8d96be1ecaa50bfdff617f1bc7584d2f429b1ef924b09dcd
-
SHA512
4cb065282d60a8abf5d1be779113fae88e27c2e619ae26b797a221bc117cbce7d7f55d270cb778b97de72b67602f99f28f194ac02c47701110aca7adaa9ad49d
-
SSDEEP
98304:Cmh0/gvY+Y6ix4HxJA79QqksfsJNGrsKZ0rz/1g:C2w+9ix4kvSqOm
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-