General
-
Target
FullOption_2.1.exe
-
Size
4.0MB
-
Sample
241109-awn1katbqh
-
MD5
9ec7934c2dd0ea95b8a3f7081ae2b9fa
-
SHA1
4e6807ebbee7490d2188fe1b3332a0a5cec053b0
-
SHA256
518bcb384a8be295dacd2516beaaf18dd8b0c081bcb7bdc4a66bb27b393bf97b
-
SHA512
a6d8fab2a3a6e9ab4ddfa81dffa1105c34dfd9cb3ae8093c475465f02678dc288935a866df060605163f1733afb0ee6d7f8e6515e6d4bfd457c1c8d38f613bfd
-
SSDEEP
98304:9rN+Jkbu8xFUvvU8nbRg3F7Nc1/m7XDjPzeLDRfF:xNZbXxeHU8bK17C/m7XDjzeLDR
Static task
static1
Malware Config
Extracted
xworm
85.203.4.149:7000
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Targets
-
-
Target
FullOption_2.1.exe
-
Size
4.0MB
-
MD5
9ec7934c2dd0ea95b8a3f7081ae2b9fa
-
SHA1
4e6807ebbee7490d2188fe1b3332a0a5cec053b0
-
SHA256
518bcb384a8be295dacd2516beaaf18dd8b0c081bcb7bdc4a66bb27b393bf97b
-
SHA512
a6d8fab2a3a6e9ab4ddfa81dffa1105c34dfd9cb3ae8093c475465f02678dc288935a866df060605163f1733afb0ee6d7f8e6515e6d4bfd457c1c8d38f613bfd
-
SSDEEP
98304:9rN+Jkbu8xFUvvU8nbRg3F7Nc1/m7XDjPzeLDRfF:xNZbXxeHU8bK17C/m7XDjzeLDR
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-