General
-
Target
javaw.exe Java(TM) Platform SE binary.exe
-
Size
66KB
-
Sample
240520-sb7laaee89
-
MD5
52409e4dbf9ed75c7fd6fbb4e7b1593c
-
SHA1
b2124798396292059c64fcb5e3d40a742ea66f0b
-
SHA256
8c63a9bbb49745a61fbf450e78485966222810403844af067f43046092b02112
-
SHA512
b72e769ced2813f5c93731e9c96bdafeb7359c9aa2b23fe9cb8bea675e1c2fcb2a7208b21bf0fc73d8255ee73bb732aea58ff7ff3a14c7727425947fa3f5c1a7
-
SSDEEP
1536:n61arE0YH/pS9OqgM6J0yJbjwe0qsYJcp66/O8J5:8iETfI9OA6J/bML9O8D
Behavioral task
behavioral1
Sample
javaw.exe Java(TM) Platform SE binary.exe
Resource
win7-20240215-en
Malware Config
Extracted
xworm
lesbian-organ.gl.at.ply.gg:38343
-
Install_directory
%LocalAppData%
-
install_file
javaw.exe Java(TM) Platform SE binary.exe
-
telegram
https://api.telegram.org/bot7026469441:AAEt3_GfOceSfMaQnCWR3hwEjHcRpqL852Q/sendMessage?chat_id=1434801883
Targets
-
-
Target
javaw.exe Java(TM) Platform SE binary.exe
-
Size
66KB
-
MD5
52409e4dbf9ed75c7fd6fbb4e7b1593c
-
SHA1
b2124798396292059c64fcb5e3d40a742ea66f0b
-
SHA256
8c63a9bbb49745a61fbf450e78485966222810403844af067f43046092b02112
-
SHA512
b72e769ced2813f5c93731e9c96bdafeb7359c9aa2b23fe9cb8bea675e1c2fcb2a7208b21bf0fc73d8255ee73bb732aea58ff7ff3a14c7727425947fa3f5c1a7
-
SSDEEP
1536:n61arE0YH/pS9OqgM6J0yJbjwe0qsYJcp66/O8J5:8iETfI9OA6J/bML9O8D
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-