General
-
Target
0e079477b2c5072f876fabdd5339ce96ed42a55361fb445d1c9bbe1282bf4850.exe
-
Size
679KB
-
Sample
240906-fzzjcsyejc
-
MD5
98a2d7aee74efe11a83e1514199a1346
-
SHA1
758365522b6a9eebe7ec5a10f4f260d3ffcd285a
-
SHA256
0e079477b2c5072f876fabdd5339ce96ed42a55361fb445d1c9bbe1282bf4850
-
SHA512
3f0c83af88c1f2b067ad56d458719cc1641a6aa672eea68adb0adc6dd25f7306dc9b8e018021828f61d514d74437683671e23e9eb731d865007335ec403722b5
-
SSDEEP
3072:gti/b34bfUYCZS6jBPbZ8L2SdoYBUBk1pfApjgrD1xJiS+F4Hsi2I/7X88eXrspS:P3ZS6jBPl8LDdSqIw
Static task
static1
Behavioral task
behavioral1
Sample
0e079477b2c5072f876fabdd5339ce96ed42a55361fb445d1c9bbe1282bf4850.exe
Resource
win7-20240704-en
Malware Config
Extracted
xworm
127.0.0.1:36301
character-acquisitions.gl.at.ply.gg:36301
-
Install_directory
%ProgramData%
-
install_file
Hoodbyunlock.exe
Targets
-
-
Target
0e079477b2c5072f876fabdd5339ce96ed42a55361fb445d1c9bbe1282bf4850.exe
-
Size
679KB
-
MD5
98a2d7aee74efe11a83e1514199a1346
-
SHA1
758365522b6a9eebe7ec5a10f4f260d3ffcd285a
-
SHA256
0e079477b2c5072f876fabdd5339ce96ed42a55361fb445d1c9bbe1282bf4850
-
SHA512
3f0c83af88c1f2b067ad56d458719cc1641a6aa672eea68adb0adc6dd25f7306dc9b8e018021828f61d514d74437683671e23e9eb731d865007335ec403722b5
-
SSDEEP
3072:gti/b34bfUYCZS6jBPbZ8L2SdoYBUBk1pfApjgrD1xJiS+F4Hsi2I/7X88eXrspS:P3ZS6jBPl8LDdSqIw
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-