Resubmissions
09-06-2024 14:59
240609-sc399acd92 10General
-
Target
VSCodeUserSetup-x64-1.90.0.exe
-
Size
95.9MB
-
Sample
240609-sc399acd92
-
MD5
49722086da01649de5ab4adb71d59329
-
SHA1
4943572885eeb320cf48dff0f8c4e4b2174277df
-
SHA256
5551a2328defe20fd5d612b78f43403a11980dafa1b46c10649fd5909076c543
-
SHA512
7c5a780a28eb47b91fa9dd45b93bd7e777e25df44bcca3e48762f85123b832175fc70f9e6a53077d3c1c2359452c66ae559803aab9bca469a7b018d2ecd044b1
-
SSDEEP
1572864:U4Xgtp7uvOMveH5NdfL2ooXT2Y+q39zuf633Joxsy+300SrfWaexBbTdDR:Vkp7uOMOHfAoqtzuf633KxX+yb8B1t
Static task
static1
Behavioral task
behavioral1
Sample
VSCodeUserSetup-x64-1.90.0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
VSCodeUserSetup-x64-1.90.0.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
5.0
addition-proxy.gl.at.ply.gg:2272
BrfCnqUW2p00FjrP
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
VSCodeUserSetup-x64-1.90.0.exe
-
Size
95.9MB
-
MD5
49722086da01649de5ab4adb71d59329
-
SHA1
4943572885eeb320cf48dff0f8c4e4b2174277df
-
SHA256
5551a2328defe20fd5d612b78f43403a11980dafa1b46c10649fd5909076c543
-
SHA512
7c5a780a28eb47b91fa9dd45b93bd7e777e25df44bcca3e48762f85123b832175fc70f9e6a53077d3c1c2359452c66ae559803aab9bca469a7b018d2ecd044b1
-
SSDEEP
1572864:U4Xgtp7uvOMveH5NdfL2ooXT2Y+q39zuf633Joxsy+300SrfWaexBbTdDR:Vkp7uOMOHfAoqtzuf633KxX+yb8B1t
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-