General
-
Target
SоlaraV3.exe
-
Size
59KB
-
Sample
241111-dnr9ss1fkr
-
MD5
d18adc1991a34b9101547af7b22aff9c
-
SHA1
fcec19b6eb73513f6cda69b7a614d0dc1b3359cf
-
SHA256
d8862eea3b8fbf11283a8b7e5e9068d9e58cb4047b1e1b0e1019f1b68783d58a
-
SHA512
ca4f145994c7bddfce345935a612b518f1ce5f1472744beaaf99285577818004b58735fb85c098b3a8b27585c2821fd6587c2aeb6a4846c82647e96ee508589f
-
SSDEEP
1536:pRYAHH+a/Fpio+TqbvWgf6VN67AGPTOkupk:pDn+adpioXbvWgAJGbOkupk
Behavioral task
behavioral1
Sample
SоlaraV3.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:11669
college-quarter.gl.at.ply.gg:11669
-
Install_directory
%LocalAppData%
-
install_file
Bootstraper.exe
Targets
-
-
Target
SоlaraV3.exe
-
Size
59KB
-
MD5
d18adc1991a34b9101547af7b22aff9c
-
SHA1
fcec19b6eb73513f6cda69b7a614d0dc1b3359cf
-
SHA256
d8862eea3b8fbf11283a8b7e5e9068d9e58cb4047b1e1b0e1019f1b68783d58a
-
SHA512
ca4f145994c7bddfce345935a612b518f1ce5f1472744beaaf99285577818004b58735fb85c098b3a8b27585c2821fd6587c2aeb6a4846c82647e96ee508589f
-
SSDEEP
1536:pRYAHH+a/Fpio+TqbvWgf6VN67AGPTOkupk:pDn+adpioXbvWgAJGbOkupk
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-