General
-
Target
jjjjjjjjjjjjjjjjjjjjjjjjjjj.exe
-
Size
930KB
-
Sample
241101-1aq6xatpas
-
MD5
327b7ea8c22c6fde0cc18d55f1b93d6d
-
SHA1
32212f75534b53e499db147c35e116413e9d93f8
-
SHA256
5fbae4b6f13ae53c0c72395da9aaff02bdd023adb735512a17d951feb869f124
-
SHA512
a40a7854947b7a38c7a369885eea28e48a52a275871a2d2038d4b8a6bb01112513ee463cccb9d0deb596331bb0c2debdf8130d3a794472fd7c5170e94d2a5eb1
-
SSDEEP
24576:tcjJkDRAIlgn/SwykVe6xBpHHd58Alq35GJ:tc1kdAIlKqwX8U/Blq35W
Static task
static1
Behavioral task
behavioral1
Sample
jjjjjjjjjjjjjjjjjjjjjjjjjjj.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
83.38.28.117:1603
83.38.24.1:1603
-
Install_directory
%Temp%
-
install_file
RuntimeBroker.exe
Targets
-
-
Target
jjjjjjjjjjjjjjjjjjjjjjjjjjj.exe
-
Size
930KB
-
MD5
327b7ea8c22c6fde0cc18d55f1b93d6d
-
SHA1
32212f75534b53e499db147c35e116413e9d93f8
-
SHA256
5fbae4b6f13ae53c0c72395da9aaff02bdd023adb735512a17d951feb869f124
-
SHA512
a40a7854947b7a38c7a369885eea28e48a52a275871a2d2038d4b8a6bb01112513ee463cccb9d0deb596331bb0c2debdf8130d3a794472fd7c5170e94d2a5eb1
-
SSDEEP
24576:tcjJkDRAIlgn/SwykVe6xBpHHd58Alq35GJ:tc1kdAIlKqwX8U/Blq35W
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-