General
-
Target
New folder (4).rar
-
Size
42.2MB
-
Sample
240609-r4zwgacc85
-
MD5
1a729f63c1b21231cef7ebae60c93ed3
-
SHA1
9e0ba9a489462462a54e0c869df46898e3c7c5c3
-
SHA256
27c1530c5875b2dcc4de80b67e0803c0a625814bac19f6a1c7f9046b381d5fec
-
SHA512
1e475a7458e5ebcedec3f74c13d1337df16c8cfad40d00cdfc25c21c1403d9dc78c4f42af67775cd9e91095fb845ff27ee0c2cb3c2fb706819ec134f57368d1f
-
SSDEEP
786432:ThdbPAgM6NRPHcRxRLMlY/rJlKtM0N7bHQuLrOyRksO7v9:T0Z6N25UErJlKtf7J/OyRzw1
Static task
static1
Behavioral task
behavioral1
Sample
New folder (4).rar
Resource
win7-20240221-en
Malware Config
Extracted
xworm
91.92.241.69:5555
-
Install_directory
%ProgramData%
-
install_file
Windows Runtime.exe
Targets
-
-
Target
New folder (4).rar
-
Size
42.2MB
-
MD5
1a729f63c1b21231cef7ebae60c93ed3
-
SHA1
9e0ba9a489462462a54e0c869df46898e3c7c5c3
-
SHA256
27c1530c5875b2dcc4de80b67e0803c0a625814bac19f6a1c7f9046b381d5fec
-
SHA512
1e475a7458e5ebcedec3f74c13d1337df16c8cfad40d00cdfc25c21c1403d9dc78c4f42af67775cd9e91095fb845ff27ee0c2cb3c2fb706819ec134f57368d1f
-
SSDEEP
786432:ThdbPAgM6NRPHcRxRLMlY/rJlKtM0N7bHQuLrOyRksO7v9:T0Z6N25UErJlKtf7J/OyRzw1
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-