General
-
Target
XClient.exe
-
Size
293KB
-
Sample
241108-wwdeqazjgm
-
MD5
ee214d10a2af9c85607bd8505e48183f
-
SHA1
acf03f4f6a1a55db5e2df2683f628dc301006000
-
SHA256
2551f4ee4a0f5e2c91eb84dc75fbc00092cb7682d84c64e54f1a39ca075781f7
-
SHA512
d3abae4f437675a3d6b30a3d021075299546675e23f57905f35d4f2c3ddf05c8558518485b972fadbeb4aaab5cfaea13f432bdc15f69154fcb5ffb3f990f0767
-
SSDEEP
3072:TRNpkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9bt+:T
Static task
static1
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:7000
-
Install_directory
%Public%
-
install_file
svchost.exe
Targets
-
-
Target
XClient.exe
-
Size
293KB
-
MD5
ee214d10a2af9c85607bd8505e48183f
-
SHA1
acf03f4f6a1a55db5e2df2683f628dc301006000
-
SHA256
2551f4ee4a0f5e2c91eb84dc75fbc00092cb7682d84c64e54f1a39ca075781f7
-
SHA512
d3abae4f437675a3d6b30a3d021075299546675e23f57905f35d4f2c3ddf05c8558518485b972fadbeb4aaab5cfaea13f432bdc15f69154fcb5ffb3f990f0767
-
SSDEEP
3072:TRNpkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9bt+:T
-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-