General
-
Target
doxertool.exe
-
Size
67KB
-
Sample
241109-ptd5xavbpc
-
MD5
7fa72309b6d27a0b561a2bd965ce3735
-
SHA1
820a0e786eb82e2c1d60709a8320ffda44cc5f99
-
SHA256
80640dcf28fdfc8e70f16951c065493aaffdb1fa98fef7fce5ee031e54673528
-
SHA512
2afab333998da6667ca3382d0e6addc98321e7516f3aa865e8bed41c3d3493c7d37a2094cf9a392897f352c2c7beb6a0e968d2d95f43e5241888ffdf6d31fa71
-
SSDEEP
1536:/s90YkCzlwuEbi2Nrg3xGIKbJI1RhAy569v3XvaO5QLy:/JCuuEbiyaxYbJIDhSnvaO5x
Malware Config
Extracted
xworm
127.0.0.1:55437
22.ip.gl.ply.gg:55437
-
Install_directory
%AppData%
-
install_file
fokustool.exe
Targets
-
-
Target
doxertool.exe
-
Size
67KB
-
MD5
7fa72309b6d27a0b561a2bd965ce3735
-
SHA1
820a0e786eb82e2c1d60709a8320ffda44cc5f99
-
SHA256
80640dcf28fdfc8e70f16951c065493aaffdb1fa98fef7fce5ee031e54673528
-
SHA512
2afab333998da6667ca3382d0e6addc98321e7516f3aa865e8bed41c3d3493c7d37a2094cf9a392897f352c2c7beb6a0e968d2d95f43e5241888ffdf6d31fa71
-
SSDEEP
1536:/s90YkCzlwuEbi2Nrg3xGIKbJI1RhAy569v3XvaO5QLy:/JCuuEbiyaxYbJIDhSnvaO5x
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-