General
-
Target
svhost.exe
-
Size
45KB
-
Sample
241107-xtxk9azmfn
-
MD5
87471900b00cc707bc1e86df98c0ca34
-
SHA1
1efbe9cf470dddc64403001c99ebf8776d5d4cb9
-
SHA256
3f2e74384a291638ec232a92347a32ceabd56e17e9848a05bd544a5cc3305aeb
-
SHA512
9fbed56dc964dbf8465e69207b6826f5b6f0df92fd96eae5eddadb6d3e8ba5e0de6344a71694c90021561e8cfdb05edf7fb4bb9c23b3d3651b34750c54806c4a
-
SSDEEP
768:yabG5pfJFqBb6CoE0RwnuUbMfms/ifp9bDY5wuc36QhOO1OPmn:yqG5oBDorRwuUYOAiR9b85G36QsO4Pmn
Behavioral task
behavioral1
Sample
svhost.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
23.ip.gl.ply.gg:51353
<Xwormmm>:1
LFDqzthtn4uKHijJ
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
svhost.exe
-
Size
45KB
-
MD5
87471900b00cc707bc1e86df98c0ca34
-
SHA1
1efbe9cf470dddc64403001c99ebf8776d5d4cb9
-
SHA256
3f2e74384a291638ec232a92347a32ceabd56e17e9848a05bd544a5cc3305aeb
-
SHA512
9fbed56dc964dbf8465e69207b6826f5b6f0df92fd96eae5eddadb6d3e8ba5e0de6344a71694c90021561e8cfdb05edf7fb4bb9c23b3d3651b34750c54806c4a
-
SSDEEP
768:yabG5pfJFqBb6CoE0RwnuUbMfms/ifp9bDY5wuc36QhOO1OPmn:yqG5oBDorRwuUYOAiR9b85G36QsO4Pmn
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-