General
-
Target
PS HAX.exe
-
Size
35KB
-
Sample
240428-kx2m6acc22
-
MD5
159a592aaff150fbca8595c135811296
-
SHA1
e045fa63bd8163fdad736e2516b2fb50c171b51f
-
SHA256
202112d1f1e79fa27a7e3ba5e5bded18f625c1c2f3d620a477a90493e3409e8b
-
SHA512
02c18bcb3bc5b4fda9f7a46cc47cc344a0b18c0c15f3031dd1436691cae0d765198679d0effbda3d0e34f2159bee2ec897a828682965ee4eb97cd8835d1a2fbc
-
SSDEEP
768:4+CD93W03O42JiB701VF49j5Ojh7bqnEmD:4h93WEO4WiR0XF49j5Ojden1
Malware Config
Extracted
xworm
5.0
aboft7e.ddns.net:8080
vLTv8ganrBDTSnb0
-
install_file
USB.exe
Targets
-
-
Target
PS HAX.exe
-
Size
35KB
-
MD5
159a592aaff150fbca8595c135811296
-
SHA1
e045fa63bd8163fdad736e2516b2fb50c171b51f
-
SHA256
202112d1f1e79fa27a7e3ba5e5bded18f625c1c2f3d620a477a90493e3409e8b
-
SHA512
02c18bcb3bc5b4fda9f7a46cc47cc344a0b18c0c15f3031dd1436691cae0d765198679d0effbda3d0e34f2159bee2ec897a828682965ee4eb97cd8835d1a2fbc
-
SSDEEP
768:4+CD93W03O42JiB701VF49j5Ojh7bqnEmD:4h93WEO4WiR0XF49j5Ojden1
-
Detect Xworm Payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-