General
-
Target
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268
-
Size
67KB
-
Sample
241103-xsghmsscql
-
MD5
4779be9e708508f643b31d997d0c26ff
-
SHA1
8f590329114fdf67ee61686e85642bd4f3ff2a60
-
SHA256
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268
-
SHA512
f6e344e09b743a4e5cbd1d861e57bdf7928a6eb5ed0b580557b99130b5f1012e2f539ff1a4ad1f7fb8f5950dfe1ce53fe9347d02fe77e9ed35112e580724b9c0
-
SSDEEP
1536:JPamCStxokeVCh4bpBSQZn2Tm3g6ePOkESeADq:FBCwxH5h4bpB5SKYPOkESe8q
Behavioral task
behavioral1
Sample
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
185.84.160.159:3306
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268
-
Size
67KB
-
MD5
4779be9e708508f643b31d997d0c26ff
-
SHA1
8f590329114fdf67ee61686e85642bd4f3ff2a60
-
SHA256
8a3560cc3874da4b2706ec801addf92a5e425c03fa54d8d105d37b24c0185268
-
SHA512
f6e344e09b743a4e5cbd1d861e57bdf7928a6eb5ed0b580557b99130b5f1012e2f539ff1a4ad1f7fb8f5950dfe1ce53fe9347d02fe77e9ed35112e580724b9c0
-
SSDEEP
1536:JPamCStxokeVCh4bpBSQZn2Tm3g6ePOkESeADq:FBCwxH5h4bpB5SKYPOkESe8q
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-