General
-
Target
FREE BYPASS.rar
-
Size
703KB
-
Sample
241110-mgtzgsxrhm
-
MD5
58292ba4352cc7ede74cea6eb6cf4764
-
SHA1
62d5ffb6fce1c50d793477bf50eaa3b706e1746d
-
SHA256
bc8e1e0d26c08f7116113bb591eb5275174652f19293f7d9a4921a580b78b042
-
SHA512
278a23320aa015c2303c808fcc7f6a718c833cc7bb8d17d54de23d132ef50bb7acbad586ad47a96341be1859336d33bca8e58427a6e030e820de437ef041f1c7
-
SSDEEP
12288:r5QdwWNKMUvO3sryrdKDRxSwj3mfXnj31KYiZqwu4Jpq9FCLcmc4ofpzvSUV:rCpK1O3cyrdCRow7mfTgjEcpmsL+4ofr
Static task
static1
Malware Config
Extracted
xworm
147.185.221.23:25808
-
Install_directory
%LocalAppData%
-
install_file
Realtek HD Audio Universal Service.exe
Targets
-
-
Target
FREE BYPASS.rar
-
Size
703KB
-
MD5
58292ba4352cc7ede74cea6eb6cf4764
-
SHA1
62d5ffb6fce1c50d793477bf50eaa3b706e1746d
-
SHA256
bc8e1e0d26c08f7116113bb591eb5275174652f19293f7d9a4921a580b78b042
-
SHA512
278a23320aa015c2303c808fcc7f6a718c833cc7bb8d17d54de23d132ef50bb7acbad586ad47a96341be1859336d33bca8e58427a6e030e820de437ef041f1c7
-
SSDEEP
12288:r5QdwWNKMUvO3sryrdKDRxSwj3mfXnj31KYiZqwu4Jpq9FCLcmc4ofpzvSUV:rCpK1O3cyrdCRow7mfTgjEcpmsL+4ofr
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-