General
-
Target
BootStrapper.bat
-
Size
302KB
-
Sample
241103-gcgkpsyrgq
-
MD5
e11a5d978c9f06cc301c8c44e52b4852
-
SHA1
831ba9abea94b996c532cdada5a79bba72a391e3
-
SHA256
d2d4ad73e3e1247c5dfa633aac6ca6e7bf0de3d0205790309759798e4bee062f
-
SHA512
f0bcd0f568f52d2519c62486ed9b94a342ee5fcd7d52835cb5d0377a1ac8b178d8ae0bd04675dd01778291b6f36807a1c27e88497c7344e15d23fdbe792349f2
-
SSDEEP
6144:U6j7gPgcFREzUgq4RgFmRYMkj/qUxD1p0/vb4YfrVTZJEdtnUNN4tK:rexEAglRetVf0/FfpPQnUNoK
Static task
static1
Malware Config
Extracted
xworm
where-reverse.gl.at.ply.gg:9999
-
Install_directory
%ProgramData%
-
install_file
Helper.exe
Targets
-
-
Target
BootStrapper.bat
-
Size
302KB
-
MD5
e11a5d978c9f06cc301c8c44e52b4852
-
SHA1
831ba9abea94b996c532cdada5a79bba72a391e3
-
SHA256
d2d4ad73e3e1247c5dfa633aac6ca6e7bf0de3d0205790309759798e4bee062f
-
SHA512
f0bcd0f568f52d2519c62486ed9b94a342ee5fcd7d52835cb5d0377a1ac8b178d8ae0bd04675dd01778291b6f36807a1c27e88497c7344e15d23fdbe792349f2
-
SSDEEP
6144:U6j7gPgcFREzUgq4RgFmRYMkj/qUxD1p0/vb4YfrVTZJEdtnUNN4tK:rexEAglRetVf0/FfpPQnUNoK
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-