General
-
Target
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3
-
Size
236KB
-
Sample
240930-clzenawhlc
-
MD5
32ceabb96383dd10e7e1b81b5a7172d5
-
SHA1
4b77984d871887252ae8a4c698fbbbd8e6af6fd0
-
SHA256
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3
-
SHA512
784e9c3a85263c3720f2e7dde1cf66f9761c9b11c3e664b52425019bdf799f504034991a3a90730b69db3e9bb9c1f62459b259792823400a7223b7ffc9c3d184
-
SSDEEP
3072:2IBL0F2988OjrLLAsNeDF5nI0PGIj9lua/Obw0hFv2PCWpIdp:2IBLu29QL0sNOBTunbw0/5Wp
Behavioral task
behavioral1
Sample
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
22.ip.gl.ply.gg:25132
RymNaZySkzhWjMqs
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3
-
Size
236KB
-
MD5
32ceabb96383dd10e7e1b81b5a7172d5
-
SHA1
4b77984d871887252ae8a4c698fbbbd8e6af6fd0
-
SHA256
c11efa494a57ce765fc9966c392a8c0168c308036c25e9264094367440b6e7f3
-
SHA512
784e9c3a85263c3720f2e7dde1cf66f9761c9b11c3e664b52425019bdf799f504034991a3a90730b69db3e9bb9c1f62459b259792823400a7223b7ffc9c3d184
-
SSDEEP
3072:2IBL0F2988OjrLLAsNeDF5nI0PGIj9lua/Obw0hFv2PCWpIdp:2IBLu29QL0sNOBTunbw0/5Wp
-
Detect Xworm Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-