General
-
Target
MEMORYCODESTEALERFROMEXE.exe
-
Size
1.2MB
-
Sample
241103-ranaksylgr
-
MD5
e9484520c0af2af421fc682c1e757c76
-
SHA1
423650cf9f48cf8cdaaac4ed9b5362eadbd0ce90
-
SHA256
1e2e67e75639830b4e39698bd9c7679d64393b435ab38fc8f07926f7ba36636b
-
SHA512
099f04bf9fa854eab58d3ec1121f47b2af326bfb560cd14cfb0ad439e0ab575ded05a164ed4a130e0a19c4d1e521f0fa3b0277114f088c7f607e4d4c1b359fa7
-
SSDEEP
24576:BwRW7N5+l5c/PNRDtual8WDSBHkiEToNkuPpVQN561xtDNwt:BwE7N565SPNRDYqfDSBLwShPAN5c3DK
Static task
static1
Behavioral task
behavioral1
Sample
MEMORYCODESTEALERFROMEXE.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
147.185.221.21:27938
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot6575053517:AAHfQSqLTvzOajvn1QldlaGUVj-u9hK2upc/sendMessage?chat_id=7492036336
Targets
-
-
Target
MEMORYCODESTEALERFROMEXE.exe
-
Size
1.2MB
-
MD5
e9484520c0af2af421fc682c1e757c76
-
SHA1
423650cf9f48cf8cdaaac4ed9b5362eadbd0ce90
-
SHA256
1e2e67e75639830b4e39698bd9c7679d64393b435ab38fc8f07926f7ba36636b
-
SHA512
099f04bf9fa854eab58d3ec1121f47b2af326bfb560cd14cfb0ad439e0ab575ded05a164ed4a130e0a19c4d1e521f0fa3b0277114f088c7f607e4d4c1b359fa7
-
SSDEEP
24576:BwRW7N5+l5c/PNRDtual8WDSBHkiEToNkuPpVQN561xtDNwt:BwE7N565SPNRDYqfDSBLwShPAN5c3DK
-
Detect Xworm Payload
-
Xworm family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-