General
-
Target
468a5e025514fd974528d09e6bbef2d90b64c82cb99a7e849c8dc6ef09c2df1a
-
Size
293KB
-
Sample
241110-12c4cswjhx
-
MD5
857bfacd75f6fce15633c5c7d5e505c0
-
SHA1
90eb6c2c7deecfa9a543f498ae32cc7229ed029e
-
SHA256
468a5e025514fd974528d09e6bbef2d90b64c82cb99a7e849c8dc6ef09c2df1a
-
SHA512
fcbb982c1e8301994054caf4fb887b4cce7e3c7ff514d9927cc2c542e5842edd588f8d00e279d89d5d606b6fb275bfb81a9ceae69dac74fc0b947eef763bfe84
-
SSDEEP
3072:GpkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9btx:
Static task
static1
Behavioral task
behavioral1
Sample
468a5e025514fd974528d09e6bbef2d90b64c82cb99a7e849c8dc6ef09c2df1a.exe
Resource
win7-20240708-en
Malware Config
Extracted
xworm
23.ip.gl.ply.gg:7000
-
Install_directory
%Public%
-
install_file
svchost.exe
Targets
-
-
Target
468a5e025514fd974528d09e6bbef2d90b64c82cb99a7e849c8dc6ef09c2df1a
-
Size
293KB
-
MD5
857bfacd75f6fce15633c5c7d5e505c0
-
SHA1
90eb6c2c7deecfa9a543f498ae32cc7229ed029e
-
SHA256
468a5e025514fd974528d09e6bbef2d90b64c82cb99a7e849c8dc6ef09c2df1a
-
SHA512
fcbb982c1e8301994054caf4fb887b4cce7e3c7ff514d9927cc2c542e5842edd588f8d00e279d89d5d606b6fb275bfb81a9ceae69dac74fc0b947eef763bfe84
-
SSDEEP
3072:GpkJuuEpKi6m/PJivSaAFOg7lkjcWVig058YbEASbod9btx:
-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-