General
-
Target
FrameHost.exe
-
Size
120KB
-
Sample
241104-zb71dawhmc
-
MD5
2e7bdd19ac4b1b5392d1d3ae047c9379
-
SHA1
67b4265da671de12bd3830f3e45f02e020ce85f4
-
SHA256
a51949df9057c52262a8e2a93bb34a76ec1a35374ba9ab6d2928f98f99af8f7f
-
SHA512
d83458902b1e430ae887a7a3b2b4cc328e965c61f30e40228bf8aba437c6185c16aef8eef031d8b69c7c436e226fad18b6792cc73f3642cd74f87cfddfc27646
-
SSDEEP
3072:n5NmCd8utYMmTCZbwW8clWOCo1a94Yjv:neCDYnWbWOCR6Yjv
Static task
static1
Behavioral task
behavioral1
Sample
FrameHost.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
93.123.109.89:7000
-
Install_directory
%Temp%
-
install_file
ApplicationFrameHost.exe
-
telegram
https://api.telegram.org/bot7026989332:AAGmlQvBZEqqtR_5LGfdSJ8B_oJ6WH5oCYY
Targets
-
-
Target
FrameHost.exe
-
Size
120KB
-
MD5
2e7bdd19ac4b1b5392d1d3ae047c9379
-
SHA1
67b4265da671de12bd3830f3e45f02e020ce85f4
-
SHA256
a51949df9057c52262a8e2a93bb34a76ec1a35374ba9ab6d2928f98f99af8f7f
-
SHA512
d83458902b1e430ae887a7a3b2b4cc328e965c61f30e40228bf8aba437c6185c16aef8eef031d8b69c7c436e226fad18b6792cc73f3642cd74f87cfddfc27646
-
SSDEEP
3072:n5NmCd8utYMmTCZbwW8clWOCo1a94Yjv:neCDYnWbWOCR6Yjv
-
Detect Xworm Payload
-
Xworm family
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-