General
-
Target
be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c.exe
-
Size
2.4MB
-
Sample
241109-d3grlswhjb
-
MD5
bdc6432b365c256c5d0efe8d66122e8f
-
SHA1
1ca7dda606a3b2204f35e43abb68b04c97063d36
-
SHA256
be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c
-
SHA512
3d28acbe162b0d88f1b3ca8a034c010a973ccc05ff3f0f0a9dbb902f98924cae1bce5f1b9f20f58567669503c41e9696000fb27edda4416398f0e7aac525b767
-
SSDEEP
49152:+2uqU+xRoatgQBJKweR4RF8gAGBJ7dj9Shv68pd3hm/F4OGP6:+2uOxRoaOQBEws4gWrhcoq3HOz
Static task
static1
Behavioral task
behavioral1
Sample
be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
93.123.109.89:7000
-
Install_directory
%Temp%
-
install_file
ApplicationFrameHost.exe
-
telegram
https://api.telegram.org/bot7026989332:AAGmlQvBZEqqtR_5LGfdSJ8B_oJ6WH5oCYY
Targets
-
-
Target
be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c.exe
-
Size
2.4MB
-
MD5
bdc6432b365c256c5d0efe8d66122e8f
-
SHA1
1ca7dda606a3b2204f35e43abb68b04c97063d36
-
SHA256
be69709414e60eae521dc4b85784bceda124959adc21b554aaa660707dbbe89c
-
SHA512
3d28acbe162b0d88f1b3ca8a034c010a973ccc05ff3f0f0a9dbb902f98924cae1bce5f1b9f20f58567669503c41e9696000fb27edda4416398f0e7aac525b767
-
SSDEEP
49152:+2uqU+xRoatgQBJKweR4RF8gAGBJ7dj9Shv68pd3hm/F4OGP6:+2uOxRoaOQBEws4gWrhcoq3HOz
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-