General
-
Target
X Project SUPER X GODDOM.exe
-
Size
326KB
-
Sample
241109-jqpjks1arg
-
MD5
6e6f88cba90c145c96d1461d60d5c152
-
SHA1
e9982c57a6777b2508070e061a7eb5a8f15b22fb
-
SHA256
968a3feb8e25469ff22d85d887972498989c1acb7d6bbcc4f982211e8fc88079
-
SHA512
71fb7b5dc56233f790b0973227a1d127b799c58b062306debbd9a67cdd741c7a123a3a6455300e27f2be9442746f4048e4f4ee4fc2e06cedbfca4e019ab6cd77
-
SSDEEP
6144:4VqG0SebO1eFh8JZpvUSlz5WeElf6+G386tPZ:4VqRFeXY3sMOh
Static task
static1
Malware Config
Extracted
xworm
5.0
client-toilet.gl.at.ply.gg:29921
NvsfH1XO1syyGREn
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
X Project SUPER X GODDOM.exe
-
Size
326KB
-
MD5
6e6f88cba90c145c96d1461d60d5c152
-
SHA1
e9982c57a6777b2508070e061a7eb5a8f15b22fb
-
SHA256
968a3feb8e25469ff22d85d887972498989c1acb7d6bbcc4f982211e8fc88079
-
SHA512
71fb7b5dc56233f790b0973227a1d127b799c58b062306debbd9a67cdd741c7a123a3a6455300e27f2be9442746f4048e4f4ee4fc2e06cedbfca4e019ab6cd77
-
SSDEEP
6144:4VqG0SebO1eFh8JZpvUSlz5WeElf6+G386tPZ:4VqRFeXY3sMOh
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-