General
-
Target
freerobuxcr.exe
-
Size
300KB
-
Sample
241109-j4ss6a1dle
-
MD5
b058cfccc6773c1bb61bf6b357beac93
-
SHA1
f5ac8e27bccac0ac28dd3fd4585e12f9801dc9fa
-
SHA256
5a2d8236f0b085c15740c484cdcc4905cd72dd75e0b9af8d3c1566b6051bdf3f
-
SHA512
ea677ebd803082435228fe4d1f43d84ee4f6f81782c159a93aa318adacaf8d2b3848385ab8826cd405eb93df7dd8713facc927c4d3d333e4073acf66be5c5de5
-
SSDEEP
3072:jhWu6gKlGmaC4CN8KI7inGK1uUg9SaJSgQ6pCtiFCzH:
Static task
static1
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:7000
-
Install_directory
%Public%
-
install_file
svchost.exe
Targets
-
-
Target
freerobuxcr.exe
-
Size
300KB
-
MD5
b058cfccc6773c1bb61bf6b357beac93
-
SHA1
f5ac8e27bccac0ac28dd3fd4585e12f9801dc9fa
-
SHA256
5a2d8236f0b085c15740c484cdcc4905cd72dd75e0b9af8d3c1566b6051bdf3f
-
SHA512
ea677ebd803082435228fe4d1f43d84ee4f6f81782c159a93aa318adacaf8d2b3848385ab8826cd405eb93df7dd8713facc927c4d3d333e4073acf66be5c5de5
-
SSDEEP
3072:jhWu6gKlGmaC4CN8KI7inGK1uUg9SaJSgQ6pCtiFCzH:
-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-