General
-
Target
Account Unbanner.exe
-
Size
83KB
-
Sample
240325-wmax8she9y
-
MD5
00af82f670cd8cca69dd7c512f922cd8
-
SHA1
cb1efa881c12ba8a51e37fb3a9ef3ffb85eda2f1
-
SHA256
7ce2cb8dd44fc76937baba9d0169d4d9942d0a0095d052b350abff87a43774f3
-
SHA512
6106def87a147a7e5f85ccb3c2274311d1b5a178e471e62e9d8d29f512a4139bb6a3eae79c3b7aa928432cb489ee61ec617616eaf7ab2bafa9c0e4e30e2df0b6
-
SSDEEP
1536:elTXxzy7eclFEx4UNOYPHMCbSmEsb1kVyjD5PTvgu7/pAOQXO+QaukdRKu:elTKHDGDM8Nbb1kAZTnyOIO+QarKu
Behavioral task
behavioral1
Sample
Account Unbanner.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
throughout-taxation.gl.at.ply.gg:48020
-
Install_directory
%AppData%
-
install_file
xworm connected?.exe
Targets
-
-
Target
Account Unbanner.exe
-
Size
83KB
-
MD5
00af82f670cd8cca69dd7c512f922cd8
-
SHA1
cb1efa881c12ba8a51e37fb3a9ef3ffb85eda2f1
-
SHA256
7ce2cb8dd44fc76937baba9d0169d4d9942d0a0095d052b350abff87a43774f3
-
SHA512
6106def87a147a7e5f85ccb3c2274311d1b5a178e471e62e9d8d29f512a4139bb6a3eae79c3b7aa928432cb489ee61ec617616eaf7ab2bafa9c0e4e30e2df0b6
-
SSDEEP
1536:elTXxzy7eclFEx4UNOYPHMCbSmEsb1kVyjD5PTvgu7/pAOQXO+QaukdRKu:elTKHDGDM8Nbb1kAZTnyOIO+QarKu
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-