General
-
Target
Chef.exe
-
Size
2.4MB
-
Sample
241105-wh5l2swajd
-
MD5
913746cb80b7853cc2430a0c067a2d4c
-
SHA1
7cfaf2942ac5aef5d73dc93e53d93eaaea673e87
-
SHA256
9e109f42594b27b9cd46bc2c921467e571ded77081b8827717dee1a63d454703
-
SHA512
943ef904a4fe28ef265a1556890002049fbf57f8992f5e8b60c09668ecab2310ab252b140331615c2be910cd5f3edd65544ee63c12651c8db398b6e91ac2c644
-
SSDEEP
49152:TL4Lbjy9eBZGXfdEl6ISzae0PF81yQYZ0yKAA6M8AAk1+ycDyJ8siSDt8:TESeD0Vs6ISx0dPQNy2ady/J8siSR8
Static task
static1
Malware Config
Extracted
xworm
93.123.109.89:7000
-
Install_directory
%Temp%
-
install_file
BackgroundTaskHost.exe
Targets
-
-
Target
Chef.exe
-
Size
2.4MB
-
MD5
913746cb80b7853cc2430a0c067a2d4c
-
SHA1
7cfaf2942ac5aef5d73dc93e53d93eaaea673e87
-
SHA256
9e109f42594b27b9cd46bc2c921467e571ded77081b8827717dee1a63d454703
-
SHA512
943ef904a4fe28ef265a1556890002049fbf57f8992f5e8b60c09668ecab2310ab252b140331615c2be910cd5f3edd65544ee63c12651c8db398b6e91ac2c644
-
SSDEEP
49152:TL4Lbjy9eBZGXfdEl6ISzae0PF81yQYZ0yKAA6M8AAk1+ycDyJ8siSDt8:TESeD0Vs6ISx0dPQNy2ady/J8siSR8
-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-