General
-
Target
Free Candy.bat
-
Size
726KB
-
Sample
240806-enlbxsyhkm
-
MD5
5f14117f1fd87fa46fb37b56e87f0e7f
-
SHA1
50a2950aaad34258933cf10f78195b61f870ee7d
-
SHA256
e4a9f2d41890743f9447638f1af46aa2cc6f6025846df8e32915de8fcd9ab1ae
-
SHA512
1ee17349daf18ed02a3cb3b67d8987a0bd7287ffe2bb2c0cf5ad5004a14c5e73de847f75a6390d24f1d1ccd619ae63d177a9c218fd4bc4b9f8ddadb105c890a0
-
SSDEEP
12288:jRqwpZL+rpkFQN7X/oWnNVnh9E8pW9IGsHmcTAl79RCMzTindB:jRL6lpvoWL/EF9IYcTiSWcB
Static task
static1
Behavioral task
behavioral1
Sample
Free Candy.bat
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Free Candy.bat
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Free Candy.bat
Resource
win11-20240802-en
Malware Config
Extracted
xworm
hard-tyler.gl.at.ply.gg:27490
-
Install_directory
%Temp%
-
install_file
systemprocess.exe
Targets
-
-
Target
Free Candy.bat
-
Size
726KB
-
MD5
5f14117f1fd87fa46fb37b56e87f0e7f
-
SHA1
50a2950aaad34258933cf10f78195b61f870ee7d
-
SHA256
e4a9f2d41890743f9447638f1af46aa2cc6f6025846df8e32915de8fcd9ab1ae
-
SHA512
1ee17349daf18ed02a3cb3b67d8987a0bd7287ffe2bb2c0cf5ad5004a14c5e73de847f75a6390d24f1d1ccd619ae63d177a9c218fd4bc4b9f8ddadb105c890a0
-
SSDEEP
12288:jRqwpZL+rpkFQN7X/oWnNVnh9E8pW9IGsHmcTAl79RCMzTindB:jRL6lpvoWL/EF9IYcTiSWcB
Score10/10-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-