General
-
Target
Zxy helper.exe
-
Size
63KB
-
Sample
241103-bpdfxszpgs
-
MD5
76f29801c7aa5ef0d3ef99f82f04c82c
-
SHA1
613a078cd094694bf2564085e55b9ff31bbc7f8c
-
SHA256
b296bb5a1a3259f2985ab130c8eeccfd1a0b816c75da5ca52762b583f0fc32de
-
SHA512
62008027a6aacfa7c95f35ff4a010a11e037dab2617fcbd3446b9b0f99041054fe364537aaeacd518a2814c025639c4e4a12754f6a72ac3802830058e808fb79
-
SSDEEP
1536:YSlt/icqQPW2zZv+bDeffo6rdprO7sYdOY:vacqnWv+bDeXldprO4XY
Malware Config
Extracted
xworm
where-reverse.gl.at.ply.gg:18649
-
Install_directory
%ProgramData%
-
install_file
Helper.exe
Targets
-
-
Target
Zxy helper.exe
-
Size
63KB
-
MD5
76f29801c7aa5ef0d3ef99f82f04c82c
-
SHA1
613a078cd094694bf2564085e55b9ff31bbc7f8c
-
SHA256
b296bb5a1a3259f2985ab130c8eeccfd1a0b816c75da5ca52762b583f0fc32de
-
SHA512
62008027a6aacfa7c95f35ff4a010a11e037dab2617fcbd3446b9b0f99041054fe364537aaeacd518a2814c025639c4e4a12754f6a72ac3802830058e808fb79
-
SSDEEP
1536:YSlt/icqQPW2zZv+bDeffo6rdprO7sYdOY:vacqnWv+bDeXldprO4XY
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-