General
-
Target
cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6.exe
-
Size
350KB
-
Sample
241102-kfgxes1gnj
-
MD5
b7de42db6732cca194950ed4b2958762
-
SHA1
e676b09f930e97a404b4dfd1a173989c39fb2681
-
SHA256
cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6
-
SHA512
5a51ac59b4c10838874c413bf6adfbb646475603e079499489f09a2d9d0eb2c1ae7b96dd353fed428180af82b40b51f37b6393d75addfb7aefa17bb3c9845224
-
SSDEEP
6144:2yScVyir/fDNsNINOgKSKN6dNbSeUKmU:ZDaNC
Static task
static1
Behavioral task
behavioral1
Sample
cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
crazyrdp.africa:7000
-
install_file
USB.exe
Targets
-
-
Target
cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6.exe
-
Size
350KB
-
MD5
b7de42db6732cca194950ed4b2958762
-
SHA1
e676b09f930e97a404b4dfd1a173989c39fb2681
-
SHA256
cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6
-
SHA512
5a51ac59b4c10838874c413bf6adfbb646475603e079499489f09a2d9d0eb2c1ae7b96dd353fed428180af82b40b51f37b6393d75addfb7aefa17bb3c9845224
-
SSDEEP
6144:2yScVyir/fDNsNINOgKSKN6dNbSeUKmU:ZDaNC
-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-