General
-
Target
b7321efe940b086b1ebb7a89ac64a2c9b8a1ec997c176ca59f0751fb0299a92f
-
Size
79KB
-
Sample
241101-yxc7fswnaq
-
MD5
de6f393b227ea641682ab9b876c43c62
-
SHA1
69bf654eb245f15fe42d8391ae4c441ef8284838
-
SHA256
b7321efe940b086b1ebb7a89ac64a2c9b8a1ec997c176ca59f0751fb0299a92f
-
SHA512
7705a11413eb8bc10ae4297d38dd091f23beca1fb824cc2bafa59bf75fd140b622ec174f1ce439a31ecd7d6a3a993a8692f43296a613b6de7347986f022d7c87
-
SSDEEP
1536:TSXQTAX6W8LdZ0tQZ4/dPxD1wbWudoDVF6oxmVJOxXNfZdWy:O8IaZYQ+PxubWubJO1Nfey
Behavioral task
behavioral1
Sample
b7321efe940b086b1ebb7a89ac64a2c9b8a1ec997c176ca59f0751fb0299a92f.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
memory-julia.gl.at.ply.gg:3595
-
Install_directory
%Temp%
-
install_file
SDASD.exe
Targets
-
-
Target
b7321efe940b086b1ebb7a89ac64a2c9b8a1ec997c176ca59f0751fb0299a92f
-
Size
79KB
-
MD5
de6f393b227ea641682ab9b876c43c62
-
SHA1
69bf654eb245f15fe42d8391ae4c441ef8284838
-
SHA256
b7321efe940b086b1ebb7a89ac64a2c9b8a1ec997c176ca59f0751fb0299a92f
-
SHA512
7705a11413eb8bc10ae4297d38dd091f23beca1fb824cc2bafa59bf75fd140b622ec174f1ce439a31ecd7d6a3a993a8692f43296a613b6de7347986f022d7c87
-
SSDEEP
1536:TSXQTAX6W8LdZ0tQZ4/dPxD1wbWudoDVF6oxmVJOxXNfZdWy:O8IaZYQ+PxubWubJO1Nfey
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-