General
-
Target
roblox executor.exe
-
Size
61KB
-
Sample
241101-mre83szdqf
-
MD5
68adc600ea667eb3f961aae6a255185d
-
SHA1
1ac679eddab6dad6b96bc52e5ef63f510db2453e
-
SHA256
deae8a2730c0fdf4cb2b2805621e48902c05647fc3882fc4a04d346b0a04ed93
-
SHA512
337baf180e6779ec0c3ae01f89139629ec123e1963c61da063d3f019c2507de631a5416312d5978f74ce1c57d2c3ce8f528accea6f3b0deaaef569d23b1d54df
-
SSDEEP
1536:WpK5NoIGud+hxXIvMf/dYUDbFqBjSBLYOebCK:W1/uchBPKUDbFT8OebT
Malware Config
Extracted
xworm
thus-dh.gl.at.ply.gg:40949
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
roblox executor.exe
-
Size
61KB
-
MD5
68adc600ea667eb3f961aae6a255185d
-
SHA1
1ac679eddab6dad6b96bc52e5ef63f510db2453e
-
SHA256
deae8a2730c0fdf4cb2b2805621e48902c05647fc3882fc4a04d346b0a04ed93
-
SHA512
337baf180e6779ec0c3ae01f89139629ec123e1963c61da063d3f019c2507de631a5416312d5978f74ce1c57d2c3ce8f528accea6f3b0deaaef569d23b1d54df
-
SSDEEP
1536:WpK5NoIGud+hxXIvMf/dYUDbFqBjSBLYOebCK:W1/uchBPKUDbFT8OebT
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-