General
-
Target
b7de42db6732cca194950ed4b2958762.bin
-
Size
172KB
-
Sample
241103-b23lks1dnf
-
MD5
75803f586257f38796c47729f75fbd58
-
SHA1
e5e8189ac812417392c1ea27322a5e38b7bc3bcd
-
SHA256
ddd313c998b0b2e2b3b996adfcf787455d2f28d8588c9695c9e4e926187dafbd
-
SHA512
355269082cae76be2363ef89f95fa65b112e1072fc9da96135da53ceb13ca28f05086f89b08c20071ff3580f2e6197e9fd909a35a32aa24390b84abaf418fde7
-
SSDEEP
3072:Ks6vSSu2P+yo4g/Xd8BfHlowbxanrfU/4DvsMPfoWL9JLtiWaRSTnsv/:KJvXjguHlowbxarCevscoK0Z13
Static task
static1
Behavioral task
behavioral1
Sample
cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
crazyrdp.africa:7000
-
install_file
USB.exe
Targets
-
-
Target
cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6.exe
-
Size
350KB
-
MD5
b7de42db6732cca194950ed4b2958762
-
SHA1
e676b09f930e97a404b4dfd1a173989c39fb2681
-
SHA256
cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6
-
SHA512
5a51ac59b4c10838874c413bf6adfbb646475603e079499489f09a2d9d0eb2c1ae7b96dd353fed428180af82b40b51f37b6393d75addfb7aefa17bb3c9845224
-
SSDEEP
6144:2yScVyir/fDNsNINOgKSKN6dNbSeUKmU:ZDaNC
-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-