General
-
Target
JJsploiter.exe
-
Size
81KB
-
Sample
240930-k442vsxaln
-
MD5
6daf8fbdd9da260639a18c0aa613ed2d
-
SHA1
0ca0bf8ef44419bcdc40c8aee7017389a4130023
-
SHA256
e3809e1d537203f55a6c0e5ccfdcca8a6477eeaede11881f54cf723bcf5120c8
-
SHA512
795de3a46cd36149b2b27220f24f3218b6e3eda05695971980e1118401d7c6ab88e57d9ce82d26663780bc49432100bf9548001e4ec3525fba9fb01d5e59c2f7
-
SSDEEP
1536:GbcwNfh6zBx0ghaNPbI3N4BLNKvU6MOyxxR6d+J:GQcJUBx0ghaNPbIdgLMv+OKRlJ
Malware Config
Extracted
xworm
cost-steam.gl.at.ply.gg:56373
-
Install_directory
%ProgramData%
-
install_file
Helper.exe
Targets
-
-
Target
JJsploiter.exe
-
Size
81KB
-
MD5
6daf8fbdd9da260639a18c0aa613ed2d
-
SHA1
0ca0bf8ef44419bcdc40c8aee7017389a4130023
-
SHA256
e3809e1d537203f55a6c0e5ccfdcca8a6477eeaede11881f54cf723bcf5120c8
-
SHA512
795de3a46cd36149b2b27220f24f3218b6e3eda05695971980e1118401d7c6ab88e57d9ce82d26663780bc49432100bf9548001e4ec3525fba9fb01d5e59c2f7
-
SSDEEP
1536:GbcwNfh6zBx0ghaNPbI3N4BLNKvU6MOyxxR6d+J:GQcJUBx0ghaNPbIdgLMv+OKRlJ
-
Detect Xworm Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-