General
-
Target
my men.bat
-
Size
337KB
-
Sample
240327-2df1sagc3t
-
MD5
7f64d778dcb01f53a2fb1ad9e88c7833
-
SHA1
b776570b989237988fcfdf07c57122a90a4df13a
-
SHA256
0bb975d3f962e67b05877d4de8f0c49eca86992c0d38890148ec78d01a7d4d91
-
SHA512
667fdd15ed509ed580466b2b4b629c0a94cc7a9d2d37f3d0a0b844f8284be1923cd8b57ca69a92f67b81e8e28d6e74367259f72e554b2e9148ad310435d8e655
-
SSDEEP
6144:pO9RfQQb7q7TqZnbOLYILURiZulrrQ5dxStevxP593o04M3Bwv3+XEKGVs7Pd08Q:pOjQ2q7TqpbOLYILURiZulrrQ5dxSte+
Static task
static1
Malware Config
Extracted
xworm
127.0.0.1:36301
character-acquisitions.gl.at.ply.gg:36301
-
Install_directory
%ProgramData%
-
install_file
Hoodbyunlock.exe
Targets
-
-
Target
my men.bat
-
Size
337KB
-
MD5
7f64d778dcb01f53a2fb1ad9e88c7833
-
SHA1
b776570b989237988fcfdf07c57122a90a4df13a
-
SHA256
0bb975d3f962e67b05877d4de8f0c49eca86992c0d38890148ec78d01a7d4d91
-
SHA512
667fdd15ed509ed580466b2b4b629c0a94cc7a9d2d37f3d0a0b844f8284be1923cd8b57ca69a92f67b81e8e28d6e74367259f72e554b2e9148ad310435d8e655
-
SSDEEP
6144:pO9RfQQb7q7TqZnbOLYILURiZulrrQ5dxStevxP593o04M3Bwv3+XEKGVs7Pd08Q:pOjQ2q7TqpbOLYILURiZulrrQ5dxSte+
-
Detect Xworm Payload
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-