General
-
Target
ssssss.bat
-
Size
293KB
-
Sample
241109-v14a9s1qbm
-
MD5
55045f48b34f00088c49b229bc07c30e
-
SHA1
f875cce5c12e06899b39223e040cad9f46ada1cd
-
SHA256
ad7c1c54dbc4a02faa20044c37c24478923ca1cc17989429caf059cc622eb95e
-
SHA512
549512c75fc5089cb7d4b41e3b55dde60ae253232f4ea7aed25296ebe6f16e6cc5d9fac8284240d23e060a6770514473eb29a81d5a6041ea43bf6d28f163ee7d
-
SSDEEP
3072:YIeH8waTPggAXw95luaeejSSb6wM7wXgfYM8J2Q3nfWvSYD5y6wHh9+nxMKi1/TM:gHbWAXnevGR6f2QvFIyD9+K/TvXum6
Static task
static1
Malware Config
Extracted
xworm
149.40.62.55:60447
-
Install_directory
%AppData%
-
install_file
System User.exe
Targets
-
-
Target
ssssss.bat
-
Size
293KB
-
MD5
55045f48b34f00088c49b229bc07c30e
-
SHA1
f875cce5c12e06899b39223e040cad9f46ada1cd
-
SHA256
ad7c1c54dbc4a02faa20044c37c24478923ca1cc17989429caf059cc622eb95e
-
SHA512
549512c75fc5089cb7d4b41e3b55dde60ae253232f4ea7aed25296ebe6f16e6cc5d9fac8284240d23e060a6770514473eb29a81d5a6041ea43bf6d28f163ee7d
-
SSDEEP
3072:YIeH8waTPggAXw95luaeejSSb6wM7wXgfYM8J2Q3nfWvSYD5y6wHh9+nxMKi1/TM:gHbWAXnevGR6f2QvFIyD9+K/TvXum6
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
A potential corporate email address has been identified in the URL: A8AB776A5245B4220A490D44@AdobeOrg
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-