General
-
Target
11ea34f77c834c824bfb59472c4c26a23918c13e701797a484a5e86544f18e7e
-
Size
41KB
-
Sample
241101-xap23avqdk
-
MD5
86fbf5b376b5daae4018e7a1652b298e
-
SHA1
c91283deb333efb4c0db91bac8839e084cc58e27
-
SHA256
11ea34f77c834c824bfb59472c4c26a23918c13e701797a484a5e86544f18e7e
-
SHA512
801b2a8ec2f2d195e62fe994eaec43f1af2883559df7d03320b801b164e7a8ef8a13e332eb06e2fc6d071e4bb81d09cad2da817e5e17fb84e8a962dd6617217c
-
SSDEEP
768:+7yYO3CpRkfGG3XvgggPLJF5PG9pmajs6vOwhu3EuzE:yT6CpRvgXvvgtFI9Aajs6vOwkNQ
Behavioral task
behavioral1
Sample
11ea34f77c834c824bfb59472c4c26a23918c13e701797a484a5e86544f18e7e.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
0.tcp.eu.ngrok.io:10358
6.tcp.eu.ngrok.io:10358
4.tcp.eu.ngrok.io:10358
QvDYkhYsc5WBgCcl
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
11ea34f77c834c824bfb59472c4c26a23918c13e701797a484a5e86544f18e7e
-
Size
41KB
-
MD5
86fbf5b376b5daae4018e7a1652b298e
-
SHA1
c91283deb333efb4c0db91bac8839e084cc58e27
-
SHA256
11ea34f77c834c824bfb59472c4c26a23918c13e701797a484a5e86544f18e7e
-
SHA512
801b2a8ec2f2d195e62fe994eaec43f1af2883559df7d03320b801b164e7a8ef8a13e332eb06e2fc6d071e4bb81d09cad2da817e5e17fb84e8a962dd6617217c
-
SSDEEP
768:+7yYO3CpRkfGG3XvgggPLJF5PG9pmajs6vOwhu3EuzE:yT6CpRvgXvvgtFI9Aajs6vOwkNQ
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-