General
-
Target
Bootstrapper.exe
-
Size
800KB
-
Sample
241104-d5n9gatapp
-
MD5
bddaabbc19e96b8ff0fdd80d8397b0ce
-
SHA1
fa11ea037f3b8681d1110badfa61d820dc5219e4
-
SHA256
d823b24077b877fef72715f39ee4580f0f3121af087303ea6ec9ecf4a1ff184e
-
SHA512
d8d57e1dc0a431b662fb87bbcc7625ab296b510cabb7586d2c5d3dba971a9a0dcec39e506b041acbc15fada9df553490a91a72bd0443027990f7705288ff9553
-
SSDEEP
1536:/bCcsuGz0xumH4yA6y9pBRQRbNsD7CsCAY26AwuxH5OFiRy7aqxWV3M:/bC6im9AHBRQRbNsyehZOFigLxW1M
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
completed-rally.gl.at.ply.gg:28996
-
Install_directory
%LocalAppData%
-
install_file
Windows Data Compiler.exe
Targets
-
-
Target
Bootstrapper.exe
-
Size
800KB
-
MD5
bddaabbc19e96b8ff0fdd80d8397b0ce
-
SHA1
fa11ea037f3b8681d1110badfa61d820dc5219e4
-
SHA256
d823b24077b877fef72715f39ee4580f0f3121af087303ea6ec9ecf4a1ff184e
-
SHA512
d8d57e1dc0a431b662fb87bbcc7625ab296b510cabb7586d2c5d3dba971a9a0dcec39e506b041acbc15fada9df553490a91a72bd0443027990f7705288ff9553
-
SSDEEP
1536:/bCcsuGz0xumH4yA6y9pBRQRbNsD7CsCAY26AwuxH5OFiRy7aqxWV3M:/bC6im9AHBRQRbNsyehZOFigLxW1M
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-