General
-
Target
45ff4bbe10d3e2a0561d19219a4738e2.exe
-
Size
1.2MB
-
Sample
240912-saqldazelq
-
MD5
45ff4bbe10d3e2a0561d19219a4738e2
-
SHA1
2bbb1c2ecf9dd62c9f22253030ae7a7b168d09a4
-
SHA256
f9adac1ef0311f015cbb89d89b24b47dace93d4fafd417af475b09def8034c3f
-
SHA512
ab2ccf3dce770ac2b9ac7dcb3acc402ecacc951172a4291f8e0fb39cff5caa5e93058c97ecd78e154e415c7ff9b9395549cff5c546f22beaf2627964f05c482f
-
SSDEEP
24576:RjRu6SPKv/PvX2av85I1eBXJN46S2tYmLvnPlNbsN1owQNrLhEl:lvuKfvms85I1oOMYmLP9aN1zQNa
Static task
static1
Behavioral task
behavioral1
Sample
45ff4bbe10d3e2a0561d19219a4738e2.exe
Resource
win7-20240729-en
Malware Config
Extracted
xworm
147.185.221.22:8888
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
45ff4bbe10d3e2a0561d19219a4738e2.exe
-
Size
1.2MB
-
MD5
45ff4bbe10d3e2a0561d19219a4738e2
-
SHA1
2bbb1c2ecf9dd62c9f22253030ae7a7b168d09a4
-
SHA256
f9adac1ef0311f015cbb89d89b24b47dace93d4fafd417af475b09def8034c3f
-
SHA512
ab2ccf3dce770ac2b9ac7dcb3acc402ecacc951172a4291f8e0fb39cff5caa5e93058c97ecd78e154e415c7ff9b9395549cff5c546f22beaf2627964f05c482f
-
SSDEEP
24576:RjRu6SPKv/PvX2av85I1eBXJN46S2tYmLvnPlNbsN1owQNrLhEl:lvuKfvms85I1oOMYmLP9aN1zQNa
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-