General
-
Target
testingthis.exe
-
Size
45KB
-
Sample
240615-t7g6ya1elp
-
MD5
063d599b1820fafc85fece1c9f1fe9e9
-
SHA1
398151d220311f78ab059a601893ef443c52760e
-
SHA256
b55eec7106cb6d22666966d3328188b754c838271fd40e1dc11cf1eb2566b272
-
SHA512
84d70ceabe06e04beb6d2bfb4150e5c7040841169319e596751ebefce288fde4d2ddee8c5fa6ef86ec6549ef88c230d0b9956b4e9d02dffd23b3a7593bec6ed6
-
SSDEEP
768:jpm7BcEKNvBcvL6VeRNL1a6ZO4PTPz+o+CKr3zQ4NuVVWgP4+zv+enbcuyD7UBwD:jpfEKNCj6VoJl9Go5K7s4Nu3t+enouyD
Behavioral task
behavioral1
Sample
testingthis.exe
Resource
win7-20231129-en
Malware Config
Extracted
xworm
location-involvement.gl.at.ply.gg:4325
-
Install_directory
%ProgramData%
-
install_file
svhost.exe
-
telegram
https://api.telegram.org/bot7168105056:AAFuCvmRFCu4d1tQpp-hoVahbWiR2XeHgHc/sendMessage?chat_id=1992635040
Targets
-
-
Target
testingthis.exe
-
Size
45KB
-
MD5
063d599b1820fafc85fece1c9f1fe9e9
-
SHA1
398151d220311f78ab059a601893ef443c52760e
-
SHA256
b55eec7106cb6d22666966d3328188b754c838271fd40e1dc11cf1eb2566b272
-
SHA512
84d70ceabe06e04beb6d2bfb4150e5c7040841169319e596751ebefce288fde4d2ddee8c5fa6ef86ec6549ef88c230d0b9956b4e9d02dffd23b3a7593bec6ed6
-
SSDEEP
768:jpm7BcEKNvBcvL6VeRNL1a6ZO4PTPz+o+CKr3zQ4NuVVWgP4+zv+enbcuyD7UBwD:jpfEKNCj6VoJl9Go5K7s4Nu3t+enouyD
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-