General
-
Target
NEXUS MULTI TOOL CB V2.exe
-
Size
232KB
-
Sample
241110-qq43laxeqp
-
MD5
fdd20779b1be9cababe4aa6f5890c0cb
-
SHA1
33dc61b1fdd8cf886b5eb897d41b8b4f16aace70
-
SHA256
8a7e5d36b08e238e067bd6ca7e7ef4d3d76a73b690a389cd46b77542d36b49f1
-
SHA512
3c2d2193cf77df541a043204a22e51fa5477cc41b2de72039b275860e298027d2154f954cc2086768fb4b6c24eaa356742a52d5749c3dba313f2830137f2ad63
-
SSDEEP
6144:mpj7RlW3E+HvNn60YIeZj34lzYffRr80cluBi9:APfkVw3kY327ii9
Static task
static1
Behavioral task
behavioral1
Sample
NEXUS MULTI TOOL CB V2.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
person-bedford.gl.at.ply.gg:99
147.185.221.23:99
-
Install_directory
%Userprofile%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7517837255:AAFFYwsM3RAJTfnCWwagMLHeBQRG-F4UScg/sendMessage?chat_id=7538845070
Targets
-
-
Target
NEXUS MULTI TOOL CB V2.exe
-
Size
232KB
-
MD5
fdd20779b1be9cababe4aa6f5890c0cb
-
SHA1
33dc61b1fdd8cf886b5eb897d41b8b4f16aace70
-
SHA256
8a7e5d36b08e238e067bd6ca7e7ef4d3d76a73b690a389cd46b77542d36b49f1
-
SHA512
3c2d2193cf77df541a043204a22e51fa5477cc41b2de72039b275860e298027d2154f954cc2086768fb4b6c24eaa356742a52d5749c3dba313f2830137f2ad63
-
SSDEEP
6144:mpj7RlW3E+HvNn60YIeZj34lzYffRr80cluBi9:APfkVw3kY327ii9
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-