General
-
Target
66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3eN
-
Size
552KB
-
Sample
241105-a4664stkcp
-
MD5
10bbf67948e6dddb51f6f08d018c0af0
-
SHA1
241eca0187de98f65f76253e1ea8998f5d51fbe5
-
SHA256
66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3e
-
SHA512
f6b2b3b2e0ca98ce80a55962c6778a94d7d2d6b7f25999965fc0a466f8d095fe729fbdc346049c9d90d76212e05314d16dcd3f28066cc51b93c9ca4883cfdfd2
-
SSDEEP
6144:I5vWMUYDhcGHAsDkeA5IvxDmUAI+K366Ujge5DAtAvKhAp081nNVjqKoeS:IxWCDhVXA5IvQ0mjgAPy6nnjqKoeS
Static task
static1
Behavioral task
behavioral1
Sample
66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3eN.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
4SlUuKAVMJTCYjjd
-
Install_directory
%AppData%
-
install_file
pdf.exe
Targets
-
-
Target
66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3eN
-
Size
552KB
-
MD5
10bbf67948e6dddb51f6f08d018c0af0
-
SHA1
241eca0187de98f65f76253e1ea8998f5d51fbe5
-
SHA256
66d19a418b63a7d1fe5aedb22b4632f65588cd8b4bff4873c0a1938585009e3e
-
SHA512
f6b2b3b2e0ca98ce80a55962c6778a94d7d2d6b7f25999965fc0a466f8d095fe729fbdc346049c9d90d76212e05314d16dcd3f28066cc51b93c9ca4883cfdfd2
-
SSDEEP
6144:I5vWMUYDhcGHAsDkeA5IvxDmUAI+K366Ujge5DAtAvKhAp081nNVjqKoeS:IxWCDhVXA5IvQ0mjgAPy6nnjqKoeS
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-