General
-
Target
ZeroxStealerInstaller.exe.zip
-
Size
2.9MB
-
Sample
241108-zlkb3azarf
-
MD5
c66179f4ac121543b97d02c0b57e7f59
-
SHA1
008e3d9ddbee7544a0e063bab08f036599f401bc
-
SHA256
1eb0ce0f9552d19ba26fc379582149b662c5706afa3f2de64aafa29c65489dc1
-
SHA512
960f01b31f3b1390c6e04dd37d9f94a07094de2236d611430fd3cdd3d0f9755e51a988dbfb0e8147f6a01e8194333c77c5c31ffc44715013b137ab99d5731603
-
SSDEEP
49152:3ny6qohNmsgwM47DvryGnf6T0Zs0YZRpb6YA5xVEarmKIL+Wa88jOB+7NBMg4QNU:3y6qwNmsgwvDjs0YZ7yfTILvojxXU
Static task
static1
Behavioral task
behavioral1
Sample
ZeroxStealerInstaller.exe
Resource
win7-20241023-en
Malware Config
Extracted
xworm
lijaligibidu-35558.portmap.host:35558
127.0.0.1:28019
chilhoek-28019.portmap.host:28019
-
Install_directory
%AppData%
-
install_file
Windows Security.exe
Targets
-
-
Target
ZeroxStealerInstaller.exe
-
Size
2.9MB
-
MD5
9b1a7d9403b93f7a390d953c2785a9ed
-
SHA1
0246222a9290cd73bfda0e402722a82d04507a43
-
SHA256
97b156f53366d0aac2e46c97b8f7bb3efb1a541e0a923aed24c0f8e7d4c4ee25
-
SHA512
fdf61c48deee07db3563859a934fd9238c3ed33bd68b180fbf46d121b233359b69d3ec6c370f0ca17bbdb444ec8a784985d54a06704dfe1ea22701124b0fc4b0
-
SSDEEP
49152:qvo+8aGzQqDRtQH/vpxWIfKgVgVKkbmNoi7r+ogPpkZs/ohvc8q8IzIWvuA8KXAb:qh83dRtMvb/KgVLNNwRkVhBNIzWvKo
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-