General
-
Target
Obfuscation.exe
-
Size
3.5MB
-
Sample
240427-tdfq1sdd4w
-
MD5
3ef77ccf451eae1d56741ebe6ae907e2
-
SHA1
c725bab6c49aab8489456d9fcf45425a302b7154
-
SHA256
8f8357d148b18d37c86c5aa9d9d0eb644f1f041ae30d576ff45b8732eec9a126
-
SHA512
8cb7a9fa370e67214bee0e713ea7189b0313895d90eb7b1e13bb0d04eb18e11aca9bcab6b17a95a80409a72a0e736915cdd2c5ca3b75fc974a6111d4f2d63e60
-
SSDEEP
49152:LtUa5j9wPntVvN/PYqaCdpssj7CSHvQNaQH6+z0i6:hUaadK
Behavioral task
behavioral1
Sample
Obfuscation.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
Obfuscation.exe
-
Size
3.5MB
-
MD5
3ef77ccf451eae1d56741ebe6ae907e2
-
SHA1
c725bab6c49aab8489456d9fcf45425a302b7154
-
SHA256
8f8357d148b18d37c86c5aa9d9d0eb644f1f041ae30d576ff45b8732eec9a126
-
SHA512
8cb7a9fa370e67214bee0e713ea7189b0313895d90eb7b1e13bb0d04eb18e11aca9bcab6b17a95a80409a72a0e736915cdd2c5ca3b75fc974a6111d4f2d63e60
-
SSDEEP
49152:LtUa5j9wPntVvN/PYqaCdpssj7CSHvQNaQH6+z0i6:hUaadK
Score10/10-
Detect Xworm Payload
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-