General
-
Target
BootStrapper.exe
-
Size
63KB
-
Sample
241103-gg399szjhk
-
MD5
c0fd9d3438390b8805ee4c259f2e4515
-
SHA1
d00f9e027be92d9df954818e69605a65c72d3e67
-
SHA256
5cc211a9596ae27be5cf99949a2dc7c1953140569c83848dd5628a1799479c2f
-
SHA512
1603fbf5409a0b5037573570f0ebeaa90be38953166535e3ab51d96760577011d64bd7aeb3798f805daca971cca67b141b00b215504589f5c8ddcf112fe7c38f
-
SSDEEP
1536:h5MY1tGpAzDlx/Ya5HbusBJu062uOCrMLdPm:XMYDrnbueurOCrQm
Malware Config
Extracted
xworm
where-reverse.gl.at.ply.gg:18649
-
Install_directory
%ProgramData%
-
install_file
Helper.exe
Targets
-
-
Target
BootStrapper.exe
-
Size
63KB
-
MD5
c0fd9d3438390b8805ee4c259f2e4515
-
SHA1
d00f9e027be92d9df954818e69605a65c72d3e67
-
SHA256
5cc211a9596ae27be5cf99949a2dc7c1953140569c83848dd5628a1799479c2f
-
SHA512
1603fbf5409a0b5037573570f0ebeaa90be38953166535e3ab51d96760577011d64bd7aeb3798f805daca971cca67b141b00b215504589f5c8ddcf112fe7c38f
-
SSDEEP
1536:h5MY1tGpAzDlx/Ya5HbusBJu062uOCrMLdPm:XMYDrnbueurOCrQm
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-