General
-
Target
MalwareBytes.rar
-
Size
85KB
-
Sample
241110-k8depstkb1
-
MD5
2a1954bb781875bd0ce09644777ce6bc
-
SHA1
d3b4f61834ff96247af0691f2e7de579dafef87f
-
SHA256
01a5a8df28b0eca2202f47d64e1a473adba2cf69c439996c775de695e1d24298
-
SHA512
47102a3a8197fbd540e0e24ec5aec173f95129e751dcc7a6c9c34a937282769a59d9c8e048378c6e8a38e618ee3f5c80283afd4d729543cc305e2ff813dc444c
-
SSDEEP
1536:bGxh0uggSCj8mboooFJxjyME+lznDNmqkORCGd2lO29eHv6TSjp6gRKqW:80uLSCjSPJxjyolznDNVkOzaQHR16vX
Static task
static1
Malware Config
Extracted
xworm
127.0.0.1:52825
all-virtual.gl.at.ply.gg:52825
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
MalwareBytes.rar
-
Size
85KB
-
MD5
2a1954bb781875bd0ce09644777ce6bc
-
SHA1
d3b4f61834ff96247af0691f2e7de579dafef87f
-
SHA256
01a5a8df28b0eca2202f47d64e1a473adba2cf69c439996c775de695e1d24298
-
SHA512
47102a3a8197fbd540e0e24ec5aec173f95129e751dcc7a6c9c34a937282769a59d9c8e048378c6e8a38e618ee3f5c80283afd4d729543cc305e2ff813dc444c
-
SSDEEP
1536:bGxh0uggSCj8mboooFJxjyME+lznDNmqkORCGd2lO29eHv6TSjp6gRKqW:80uLSCjSPJxjyolznDNVkOzaQHR16vX
-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-