General
-
Target
Hoodbyunlock.exe
-
Size
205KB
-
Sample
240905-xtqspsxekj
-
MD5
74d8f5a1e068a454ffaa5c8fd32a3e44
-
SHA1
46599d94edc83e67e6bde3579f61028e2bee7096
-
SHA256
59b203fcf387bfde09a17d954c9281f5743b0d0edb9c8d1fc481eb0165416fd0
-
SHA512
6d5e8aeb8a5139f31b0f8ed55655c0eb52b3e2589cf1e6ee3c13b06394ceba72da0dc5e01972386bd75b01d17c16e00d50fe2c1e3a2c4b2a5a6b70b0a753ec3d
-
SSDEEP
3072:prm4sOjb48smI2WjbeYpX6Ou7atBBZ4uzDSEG2dCBVDtM5:pLsDbDpXKkZ4mSB2dCju
Behavioral task
behavioral1
Sample
Hoodbyunlock.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:36301
character-acquisitions.gl.at.ply.gg:36301
-
Install_directory
%ProgramData%
-
install_file
Hoodbyunlock.exe
Targets
-
-
Target
Hoodbyunlock.exe
-
Size
205KB
-
MD5
74d8f5a1e068a454ffaa5c8fd32a3e44
-
SHA1
46599d94edc83e67e6bde3579f61028e2bee7096
-
SHA256
59b203fcf387bfde09a17d954c9281f5743b0d0edb9c8d1fc481eb0165416fd0
-
SHA512
6d5e8aeb8a5139f31b0f8ed55655c0eb52b3e2589cf1e6ee3c13b06394ceba72da0dc5e01972386bd75b01d17c16e00d50fe2c1e3a2c4b2a5a6b70b0a753ec3d
-
SSDEEP
3072:prm4sOjb48smI2WjbeYpX6Ou7atBBZ4uzDSEG2dCBVDtM5:pLsDbDpXKkZ4mSB2dCju
-
Detect Xworm Payload
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-