General
-
Target
test.exe
-
Size
38KB
-
Sample
241105-ed4qhstjdt
-
MD5
064adc1ac0842c1a8853c73cff06d1de
-
SHA1
ba39fd621bd15c85d7e126c3a8d1a82c528e40c1
-
SHA256
d5e04f673bbe88fe9592392cea03a3212f1f2204d12468126d11e63319422343
-
SHA512
32d721342056349bcb3203a5407d936eee2bf9a0c50ac271fbc19753bfd47cd2cde827d5de1c8c7bac88481911afd42890b47fabacd28e6dd7c43cb228934568
-
SSDEEP
768:zlhOEwjbrttFxUFNNixYD8YRRoNbTepFj9jae6SOMhULk/:zPybrwf2kRoNbTqFj9+e6SOMqY
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
java-either.gl.at.ply.gg:50133
ajPUYvc7uZ6Tonau
-
install_file
USB.exe
Targets
-
-
Target
test.exe
-
Size
38KB
-
MD5
064adc1ac0842c1a8853c73cff06d1de
-
SHA1
ba39fd621bd15c85d7e126c3a8d1a82c528e40c1
-
SHA256
d5e04f673bbe88fe9592392cea03a3212f1f2204d12468126d11e63319422343
-
SHA512
32d721342056349bcb3203a5407d936eee2bf9a0c50ac271fbc19753bfd47cd2cde827d5de1c8c7bac88481911afd42890b47fabacd28e6dd7c43cb228934568
-
SSDEEP
768:zlhOEwjbrttFxUFNNixYD8YRRoNbTepFj9jae6SOMhULk/:zPybrwf2kRoNbTqFj9+e6SOMqY
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-