General
-
Target
Output.exe
-
Size
883KB
-
Sample
241108-e2bpmsxrcq
-
MD5
968a96a052af886b1fcec09332b8fb17
-
SHA1
c753cb113ae3d58ecdb1681b1297f14452c4899f
-
SHA256
71fc9d8209f82b251fef2fdeee9a441a739719e5fe66c12883e67b8381f8c11f
-
SHA512
63483c9b1f1398bd621fb4983ebbabcb33368aa312dabce2db7c1bace15eba4db9609742c8f4b7e0daa769de0a59ad9883e7010e06c1fcb34d722d488a5b4a91
-
SSDEEP
24576:OSAf8tUxkKfeR40FLYylkHD6kAhgJY9roBpbO7Jf:kOUx8RF/lkjqhg/Da7Jf
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:32758
pressure-continuous.gl.at.ply.gg:32758
-
Install_directory
%Temp%
-
install_file
USB.exe
Targets
-
-
Target
Output.exe
-
Size
883KB
-
MD5
968a96a052af886b1fcec09332b8fb17
-
SHA1
c753cb113ae3d58ecdb1681b1297f14452c4899f
-
SHA256
71fc9d8209f82b251fef2fdeee9a441a739719e5fe66c12883e67b8381f8c11f
-
SHA512
63483c9b1f1398bd621fb4983ebbabcb33368aa312dabce2db7c1bace15eba4db9609742c8f4b7e0daa769de0a59ad9883e7010e06c1fcb34d722d488a5b4a91
-
SSDEEP
24576:OSAf8tUxkKfeR40FLYylkHD6kAhgJY9roBpbO7Jf:kOUx8RF/lkjqhg/Da7Jf
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-