General
-
Target
steam.exe
-
Size
54.6MB
-
Sample
241012-phstxsvaqp
-
MD5
2f6c62b7e19d9a02beeaa8a56e5c36be
-
SHA1
ff275ba50caadd775a26f2747005b971ebe8e422
-
SHA256
585c3fb57044f4ba45beeb30fcbc258dc359cbd5d959e9109756a0b2259a6f16
-
SHA512
5c9bbad2b0e14d36d5a468d27d8f16158abc12ad0c536d48810585b7641f13f5e11889deec2b91038bbae75e6ada71b64fb476566cb2a1acdbb4caae5486d8c0
-
SSDEEP
786432:d2641LcIhSvWNKis14g1lFM2Af7zuM09u3tHlBPn/RgUs3pOUCOzZJAHhOup1h2h:w64AIhSuNKhzHAf3xCrDABOqhPO
Static task
static1
Behavioral task
behavioral1
Sample
steam.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:7036
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
steam.exe
-
Size
54.6MB
-
MD5
2f6c62b7e19d9a02beeaa8a56e5c36be
-
SHA1
ff275ba50caadd775a26f2747005b971ebe8e422
-
SHA256
585c3fb57044f4ba45beeb30fcbc258dc359cbd5d959e9109756a0b2259a6f16
-
SHA512
5c9bbad2b0e14d36d5a468d27d8f16158abc12ad0c536d48810585b7641f13f5e11889deec2b91038bbae75e6ada71b64fb476566cb2a1acdbb4caae5486d8c0
-
SSDEEP
786432:d2641LcIhSvWNKis14g1lFM2Af7zuM09u3tHlBPn/RgUs3pOUCOzZJAHhOup1h2h:w64AIhSuNKhzHAf3xCrDABOqhPO
-
Detect Umbral payload
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-