General
-
Target
eheheh.exe
-
Size
83KB
-
Sample
241110-ja4nkasdnn
-
MD5
6bb17f4042738219708a1fcd785b2f20
-
SHA1
7b7f33f12a9a7602ad2b1128ca51b4336c63bf8b
-
SHA256
52f750c805eb0d8d1175b9b648bc6e458bcbb33048c864d8e064099c44addfa1
-
SHA512
f4c22bc88e3644621fcc2853562e8312a4b68c673148742b0cae3c54c0e7c80f19c31d9d32114a385fabb1248740467b19bea1ab0d6d05c42ca35878e4c8e8e6
-
SSDEEP
1536:POGdaV0R6Gkp3UyLshEjoE9I8uEMWb15uaGM53/m8AWm6Z3JOY451:WGdBS3Un8oE9I8+Wb15uaxxL3JOY43
Malware Config
Extracted
xworm
about-publishing.gl.at.ply.gg:49157
-
Install_directory
%AppData%
-
install_file
update.exe
Targets
-
-
Target
eheheh.exe
-
Size
83KB
-
MD5
6bb17f4042738219708a1fcd785b2f20
-
SHA1
7b7f33f12a9a7602ad2b1128ca51b4336c63bf8b
-
SHA256
52f750c805eb0d8d1175b9b648bc6e458bcbb33048c864d8e064099c44addfa1
-
SHA512
f4c22bc88e3644621fcc2853562e8312a4b68c673148742b0cae3c54c0e7c80f19c31d9d32114a385fabb1248740467b19bea1ab0d6d05c42ca35878e4c8e8e6
-
SSDEEP
1536:POGdaV0R6Gkp3UyLshEjoE9I8uEMWb15uaGM53/m8AWm6Z3JOY451:WGdBS3Un8oE9I8+Wb15uaxxL3JOY43
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-