General
-
Target
Nkomssgp.exe
-
Size
4.6MB
-
Sample
240615-fxy5tatdlr
-
MD5
1d6421617b9bdaccaa87db2edc96cda0
-
SHA1
002eb8b01151aebe91d8a8f8d4ed52c3aad9e1b2
-
SHA256
a25bff1c3254fa942a830abd32bd1953e282a321a94ab9fc22e25f66d5f4b1a2
-
SHA512
80f991929992adeda30d8137bf59c435671548f4580dac3e1c6df7c129c5d554711365a3b375cff8568345f554f971026ea60785931deeb8baacd6c643e92104
-
SSDEEP
24576:w5VeFILu7XJJbYzr8KNJWtOh6S9JD4E678avKanuEXLI16NqX6QZkUHHsOS8dK/Z:4Vw
Static task
static1
Malware Config
Targets
-
-
Target
Nkomssgp.exe
-
Size
4.6MB
-
MD5
1d6421617b9bdaccaa87db2edc96cda0
-
SHA1
002eb8b01151aebe91d8a8f8d4ed52c3aad9e1b2
-
SHA256
a25bff1c3254fa942a830abd32bd1953e282a321a94ab9fc22e25f66d5f4b1a2
-
SHA512
80f991929992adeda30d8137bf59c435671548f4580dac3e1c6df7c129c5d554711365a3b375cff8568345f554f971026ea60785931deeb8baacd6c643e92104
-
SSDEEP
24576:w5VeFILu7XJJbYzr8KNJWtOh6S9JD4E678avKanuEXLI16NqX6QZkUHHsOS8dK/Z:4Vw
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-