General
-
Target
bkcracker-privateV1.2.exe
-
Size
79KB
-
Sample
241102-z99xmawcpf
-
MD5
47abba11eb5de0176dc2620268f973b9
-
SHA1
88c65fd19f6f158164e7052285cb08a3bc3b1577
-
SHA256
e9757cf90a5b034412b7f5cdd7211b3274d22f981fa0cace2a4a67e0e9ad0be8
-
SHA512
cd9772dfa31d7b4fa81bc32d6c18db84f50bad47a80b0ba1f9d328ee532e0a3b72a4fbbd1d3739e469d4566bcf32fe5188a1f7969076b883b46f74416a7869e7
-
SSDEEP
1536:uq9exgGaR2sY5RYM/+YfYFb9qosm3zqjL/Rcop8OczVrl6n2L9v0gjRh:uqnfvEGmUFb9guoiOexl3MMh
Behavioral task
behavioral1
Sample
bkcracker-privateV1.2.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
10.0.0.97:7000
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
bkcracker-privateV1.2.exe
-
Size
79KB
-
MD5
47abba11eb5de0176dc2620268f973b9
-
SHA1
88c65fd19f6f158164e7052285cb08a3bc3b1577
-
SHA256
e9757cf90a5b034412b7f5cdd7211b3274d22f981fa0cace2a4a67e0e9ad0be8
-
SHA512
cd9772dfa31d7b4fa81bc32d6c18db84f50bad47a80b0ba1f9d328ee532e0a3b72a4fbbd1d3739e469d4566bcf32fe5188a1f7969076b883b46f74416a7869e7
-
SSDEEP
1536:uq9exgGaR2sY5RYM/+YfYFb9qosm3zqjL/Rcop8OczVrl6n2L9v0gjRh:uqnfvEGmUFb9guoiOexl3MMh
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-