General
-
Target
5f856b5279515ba01772da22716eb28b6c5c28290d7f35609b95e2e27c29a267
-
Size
42KB
-
Sample
240419-v8tf2abg2w
-
MD5
a00b6a4426fd5c79c7892c92abd57566
-
SHA1
5ad45745699862378243bc0ac413b09855b0ae09
-
SHA256
5f856b5279515ba01772da22716eb28b6c5c28290d7f35609b95e2e27c29a267
-
SHA512
f7e416c804fb516169e1b9fca4ba8dce349691845f53a65474d227bddafb14a6930d260e2483b8d30b206367aac945711fadf9bf9db013f7086f90a8032a4529
-
SSDEEP
768:cFSbNnaRt3s2IN3gE4hReHofNctzh90sYztVHMAqBUDfWjd7Tn:ckbNa33HIzmRBiZh9v0MAKSuJfn
Behavioral task
behavioral1
Sample
2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
win-britain.gl.at.ply.gg:55238
-
Install_directory
%AppData%
-
install_file
testnt.exe
Targets
-
-
Target
2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f.exe
-
Size
70KB
-
MD5
3149ac1cd2f798f14c82e4eaa81b1853
-
SHA1
7939c17fc5433dcf060c2035bc035e5fefd33078
-
SHA256
2391648221057ae4454b46e4010db00fa25551df4835c916ad1cf1354077234f
-
SHA512
c584204b5287b1c25fa33e7551504b19e60b89e05bbfe660146da9a1a937e32107f3eb95db5e63377308aa481d478b5e1ccf5c543b95317672328adbc685ad9a
-
SSDEEP
1536:1pOkU3DTMDMiAjp076sFiT/xXbC6gywEX3UUzGZDO2mvZRmD:1zUXMYd98QjxbC3I01O22SD
-
Detect Xworm Payload
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-