General
-
Target
XClient3.bat
-
Size
264KB
-
Sample
241002-bnkhvazdlr
-
MD5
96bc4a2abe18426797c6c63b05b275b3
-
SHA1
0cdcf4d9b03ff0624f2ac8793a5fa315a98d4e16
-
SHA256
a7f49df64ba98d30e7a9f80997638f97d44b5163e818e167dbbc073bd55e2362
-
SHA512
28ca089ac3bfbe21b9c37c20c347ad68da03c65e1687674b0a437cacfdc59d737576c12149f3b903588d3b50aab71c185e0ec36a0831ba0398b9f56fa52e28e6
-
SSDEEP
6144:6G98bC57ublkrWd3leRpXteJsPYAifRaqKEdd8E:9D57uZ4s3lgNwA8db8E
Static task
static1
Malware Config
Extracted
xworm
5.0
127.0.0.1:47628
employment-celebs.gl.at.ply.gg:47628
UrZFZ6UDLpSiVpzn
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
XClient3.bat
-
Size
264KB
-
MD5
96bc4a2abe18426797c6c63b05b275b3
-
SHA1
0cdcf4d9b03ff0624f2ac8793a5fa315a98d4e16
-
SHA256
a7f49df64ba98d30e7a9f80997638f97d44b5163e818e167dbbc073bd55e2362
-
SHA512
28ca089ac3bfbe21b9c37c20c347ad68da03c65e1687674b0a437cacfdc59d737576c12149f3b903588d3b50aab71c185e0ec36a0831ba0398b9f56fa52e28e6
-
SSDEEP
6144:6G98bC57ublkrWd3leRpXteJsPYAifRaqKEdd8E:9D57uZ4s3lgNwA8db8E
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-