General
-
Target
ItachiSuperSpoofer.exe
-
Size
46KB
-
Sample
241102-1gbd2ayqam
-
MD5
bbcc30d76b31b102204c01d112f98b15
-
SHA1
a05e5f69ab886c58e695e5f545b34193fce169a7
-
SHA256
e3bd1735607a84ce63f2678c0e3b5397f665a2826c5603b53345072a91c5d815
-
SHA512
502237bc308be48adb6ddfef3edd7db045aaa6dd9712fd026a5e51fbe3011faaa50ca8fb8f11f4a4ad67e4398da84acd5281768e9856d6cede8a420d1e2327b9
-
SSDEEP
768:tc4O3Um5dr30Cn2W/AD1JeM7XzYc/cEzwsf9K0g6tJhZW9s:t6km5dX2WYDrvxz5XgCRb
Static task
static1
Behavioral task
behavioral1
Sample
ItachiSuperSpoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ItachiSuperSpoofer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
ensure-manual.gl.at.ply.gg:41199
v67WFYQWDnW3aeSs
-
Install_directory
%AppData%
-
install_file
dllhost.exe
Targets
-
-
Target
ItachiSuperSpoofer.exe
-
Size
46KB
-
MD5
bbcc30d76b31b102204c01d112f98b15
-
SHA1
a05e5f69ab886c58e695e5f545b34193fce169a7
-
SHA256
e3bd1735607a84ce63f2678c0e3b5397f665a2826c5603b53345072a91c5d815
-
SHA512
502237bc308be48adb6ddfef3edd7db045aaa6dd9712fd026a5e51fbe3011faaa50ca8fb8f11f4a4ad67e4398da84acd5281768e9856d6cede8a420d1e2327b9
-
SSDEEP
768:tc4O3Um5dr30Cn2W/AD1JeM7XzYc/cEzwsf9K0g6tJhZW9s:t6km5dX2WYDrvxz5XgCRb
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-