Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 03:03
Behavioral task
behavioral1
Sample
SоlaraV3.exe
Resource
win7-20241023-en
windows7-x64
5 signatures
150 seconds
General
-
Target
SоlaraV3.exe
-
Size
59KB
-
MD5
d18adc1991a34b9101547af7b22aff9c
-
SHA1
fcec19b6eb73513f6cda69b7a614d0dc1b3359cf
-
SHA256
d8862eea3b8fbf11283a8b7e5e9068d9e58cb4047b1e1b0e1019f1b68783d58a
-
SHA512
ca4f145994c7bddfce345935a612b518f1ce5f1472744beaaf99285577818004b58735fb85c098b3a8b27585c2821fd6587c2aeb6a4846c82647e96ee508589f
-
SSDEEP
1536:pRYAHH+a/Fpio+TqbvWgf6VN67AGPTOkupk:pDn+adpioXbvWgAJGbOkupk
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:11669
college-quarter.gl.at.ply.gg:11669
Attributes
-
Install_directory
%LocalAppData%
-
install_file
Bootstraper.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/1168-1-0x00000000002B0000-0x00000000002C6000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1168 SоlaraV3.exe