General
-
Target
SeroXenBuilder.exe
-
Size
91KB
-
Sample
240411-tmd9jsfb65
-
MD5
8e298601185d24d6b8d9ba9d04eb4da8
-
SHA1
308c42c588c7dffcbe895b32a62b7edb689db20a
-
SHA256
f53553980b3b4a76cc4faf39f7338e20107f9fd6e1e65cf7f23185ced976f8c4
-
SHA512
4dc01eb4753065753b463247fdb450cad69432924e9f1c156512d34c2d676f389ef5d6665cc8deda003187683a201b5114abd093b693fe999f9165b3bf0fb4f4
-
SSDEEP
1536:dKgm3aS+IJ+fc3mPZoCGWvw+tWMeROVhTkbeIRR4LlV5/eEWCU8VQDDY4:dK33F+I8flo/SogVNBhV5GEyc4
Static task
static1
Behavioral task
behavioral1
Sample
SeroXenBuilder.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SeroXenBuilder.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
no-speed.gl.at.ply.gg:1836
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
SeroXenBuilder.exe
-
Size
91KB
-
MD5
8e298601185d24d6b8d9ba9d04eb4da8
-
SHA1
308c42c588c7dffcbe895b32a62b7edb689db20a
-
SHA256
f53553980b3b4a76cc4faf39f7338e20107f9fd6e1e65cf7f23185ced976f8c4
-
SHA512
4dc01eb4753065753b463247fdb450cad69432924e9f1c156512d34c2d676f389ef5d6665cc8deda003187683a201b5114abd093b693fe999f9165b3bf0fb4f4
-
SSDEEP
1536:dKgm3aS+IJ+fc3mPZoCGWvw+tWMeROVhTkbeIRR4LlV5/eEWCU8VQDDY4:dK33F+I8flo/SogVNBhV5GEyc4
-
Detect Xworm Payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-