General
-
Target
op.exe
-
Size
68KB
-
Sample
240503-pxnthsff5v
-
MD5
d4c021f050296c309b84059bafa41332
-
SHA1
f0df37f5f880969fcbba1f4f7d9ab7cdb3e596c5
-
SHA256
a615aece52e909040876d9f88984d4a60499f2604dc181acc69aa241dd1e1ed2
-
SHA512
27be42f79cbbf0c8a81c5a2decd0a393e27b0459bff9ed7b5f9b926e93da5f096efbfa6f473525db1d3269795c174506f544866a82774a4d5948bd644bb3aea7
-
SSDEEP
1536:LObri+HdUrMuOGw+btMvnz7W7jqwaeAdKO2mIJ/1h1:LOnxdPuTw+bavfw6QO2mIJf1
Behavioral task
behavioral1
Sample
op.exe
Resource
win7-20231129-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
dllhost.exe
-
telegram
https://api.telegram.org/bot6840593734:AAGeMJswJHfSYYy4WpS8cypmpzA8wfWUYMg/sendMessage?chat_id=1330099235
Targets
-
-
Target
op.exe
-
Size
68KB
-
MD5
d4c021f050296c309b84059bafa41332
-
SHA1
f0df37f5f880969fcbba1f4f7d9ab7cdb3e596c5
-
SHA256
a615aece52e909040876d9f88984d4a60499f2604dc181acc69aa241dd1e1ed2
-
SHA512
27be42f79cbbf0c8a81c5a2decd0a393e27b0459bff9ed7b5f9b926e93da5f096efbfa6f473525db1d3269795c174506f544866a82774a4d5948bd644bb3aea7
-
SSDEEP
1536:LObri+HdUrMuOGw+btMvnz7W7jqwaeAdKO2mIJ/1h1:LOnxdPuTw+bavfw6QO2mIJf1
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-