General
-
Target
2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear
-
Size
387KB
-
Sample
241102-jf6p4s1dln
-
MD5
f65f2a9fdc2e61ef6fc2d37844949049
-
SHA1
a41e5e5970eac8bcc110261a81f047496caf1bc0
-
SHA256
d74da9974644408ec493ce12f2c05e6aa270c3e9b829e8434d2f0278f8f2ae3a
-
SHA512
71062b7b62bf0ff80d4795d4ab1427621d9831ad2a0526d95135f2f1e4b53b851c830fa51501664070df3845a04efc13c157d0ca67b04f71277af9f6cff3f882
-
SSDEEP
12288:Eh1Lk70Tnvjc7dAANmNmYnGqwz5XSBvv71:Ak70TrcxAhmWJwzZc3h
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2024-11-02_f65f2a9fdc2e61ef6fc2d37844949049_drokbk_hiddentear
-
Size
387KB
-
MD5
f65f2a9fdc2e61ef6fc2d37844949049
-
SHA1
a41e5e5970eac8bcc110261a81f047496caf1bc0
-
SHA256
d74da9974644408ec493ce12f2c05e6aa270c3e9b829e8434d2f0278f8f2ae3a
-
SHA512
71062b7b62bf0ff80d4795d4ab1427621d9831ad2a0526d95135f2f1e4b53b851c830fa51501664070df3845a04efc13c157d0ca67b04f71277af9f6cff3f882
-
SSDEEP
12288:Eh1Lk70Tnvjc7dAANmNmYnGqwz5XSBvv71:Ak70TrcxAhmWJwzZc3h
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-