General
-
Target
jjjçtepad.exe
-
Size
879KB
-
Sample
241101-1k8hyawbme
-
MD5
ba63790213ee68adc6333242a703cdd3
-
SHA1
07e578b9206de65de0ffa19b01e59127bad21072
-
SHA256
ea7c3fd6786b6374e94f001d75ad9ddc53ee8316cc20cd0d6978eba6fb6caaa7
-
SHA512
6d365291e5ade1e7047528637b079458933e9eed726f2d79c5f806414c445a8da2a4adee40fe1e2f32a65936975ab79ba6ef22ed57ec933ad1a5dce880f5ba2e
-
SSDEEP
12288:TlVYSjCSUFFIn2qH+Pc4w1dltLNe7ZfF5IrQ2NYpxfrOLi6820Y5GpX:ZVYs+Fc9ePlw1dltIb2EUi68PY5GJ
Static task
static1
Behavioral task
behavioral1
Sample
jjjçtepad.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
83.38.24.1:1603
-
Install_directory
%Temp%
-
install_file
SecurityHealthSystray.exe
Targets
-
-
Target
jjjçtepad.exe
-
Size
879KB
-
MD5
ba63790213ee68adc6333242a703cdd3
-
SHA1
07e578b9206de65de0ffa19b01e59127bad21072
-
SHA256
ea7c3fd6786b6374e94f001d75ad9ddc53ee8316cc20cd0d6978eba6fb6caaa7
-
SHA512
6d365291e5ade1e7047528637b079458933e9eed726f2d79c5f806414c445a8da2a4adee40fe1e2f32a65936975ab79ba6ef22ed57ec933ad1a5dce880f5ba2e
-
SSDEEP
12288:TlVYSjCSUFFIn2qH+Pc4w1dltLNe7ZfF5IrQ2NYpxfrOLi6820Y5GpX:ZVYs+Fc9ePlw1dltIb2EUi68PY5GJ
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-