General
-
Target
CppMalware.exe
-
Size
289KB
-
Sample
240908-t38s4ayemh
-
MD5
4a9b568bfb7762d641f077c4569aa223
-
SHA1
2f1c1b8ad4202e96f43290926e72be839b5d66e5
-
SHA256
9b39914b6ec9c2e7fe927d4f9f7605faba84884f2032c714fe435d830c615777
-
SHA512
e431b3f73acce527e8471aca5b187ef71277a1bd197601423d0ddbbd6d894ac7b090d4e52bbb261e3f2f9c2d782436cc6b80e0272d6bbd4a306478689eb7b352
-
SSDEEP
6144:BpxxsAu3scVMNSxr2VRIco4XgMOXQfTluX7I6ysB:lxsBcclr4RzXgrgr+I6JB
Static task
static1
Malware Config
Extracted
xworm
super-nearest.gl.at.ply.gg:17835
-
install_file
USB.exe
Targets
-
-
Target
CppMalware.exe
-
Size
289KB
-
MD5
4a9b568bfb7762d641f077c4569aa223
-
SHA1
2f1c1b8ad4202e96f43290926e72be839b5d66e5
-
SHA256
9b39914b6ec9c2e7fe927d4f9f7605faba84884f2032c714fe435d830c615777
-
SHA512
e431b3f73acce527e8471aca5b187ef71277a1bd197601423d0ddbbd6d894ac7b090d4e52bbb261e3f2f9c2d782436cc6b80e0272d6bbd4a306478689eb7b352
-
SSDEEP
6144:BpxxsAu3scVMNSxr2VRIco4XgMOXQfTluX7I6ysB:lxsBcclr4RzXgrgr+I6JB
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-