General
-
Target
jjj.exe
-
Size
773KB
-
Sample
241101-13w8maxngl
-
MD5
87a896c479974de2a6e2bea021e4ba23
-
SHA1
67e4d876097d823c18bd06d13250e27b1645080c
-
SHA256
fd3b7fe5e00fa4cc4f959db0c97908202a0f8054bf3aebecc57bf22f30f349ae
-
SHA512
2f510199800543655403476360b5815ceb87f74bc60c6c51cbebd1baf25ce48254f53ce6e8f430f1981f3aef03bc371f8d177a0e9a64f01b1fb7323d0fb353e2
-
SSDEEP
12288:iTfx1EdDy76ztuJdJHR4ih+IbwOnNeFknYhzQ0GyG4Gt1BfPnM2vDwvfxCo:W18VJqdduigIsOnNe44E0GFPz82vDgz
Static task
static1
Behavioral task
behavioral1
Sample
jjj.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
jjj.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
83.38.24.1:1603
-
Install_directory
%Userprofile%
-
install_file
svhost.exe
Targets
-
-
Target
jjj.exe
-
Size
773KB
-
MD5
87a896c479974de2a6e2bea021e4ba23
-
SHA1
67e4d876097d823c18bd06d13250e27b1645080c
-
SHA256
fd3b7fe5e00fa4cc4f959db0c97908202a0f8054bf3aebecc57bf22f30f349ae
-
SHA512
2f510199800543655403476360b5815ceb87f74bc60c6c51cbebd1baf25ce48254f53ce6e8f430f1981f3aef03bc371f8d177a0e9a64f01b1fb7323d0fb353e2
-
SSDEEP
12288:iTfx1EdDy76ztuJdJHR4ih+IbwOnNeFknYhzQ0GyG4Gt1BfPnM2vDwvfxCo:W18VJqdduigIsOnNe44E0GFPz82vDgz
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-