General
-
Target
FULLOPTION CRACK BY MELT V2.1.exe
-
Size
4.0MB
-
Sample
241111-ekby3swkar
-
MD5
167b9c9fdac699b76270c7de1c5be79f
-
SHA1
1e30a9c99e3f9d04ab4a5964b209779700df5cf8
-
SHA256
326cf06d90f11f9d0dcbb02e69bdab30635dbbabbda6c886dde897207f019d9d
-
SHA512
1015c725d43251a40130929860305ba3cf54df417b5288820f89ca406e7f84400d372d77b0f5fbccd208f4d738c4d8b933488b3ce0fb47e37820932ef0343f1d
-
SSDEEP
98304:GL9E+Y76D/jak6xrxOEnzPca0n5rK/iS:C9a7C/pUr730nmi
Static task
static1
Behavioral task
behavioral1
Sample
FULLOPTION CRACK BY MELT V2.1.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
45.141.26.214:7000
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Targets
-
-
Target
FULLOPTION CRACK BY MELT V2.1.exe
-
Size
4.0MB
-
MD5
167b9c9fdac699b76270c7de1c5be79f
-
SHA1
1e30a9c99e3f9d04ab4a5964b209779700df5cf8
-
SHA256
326cf06d90f11f9d0dcbb02e69bdab30635dbbabbda6c886dde897207f019d9d
-
SHA512
1015c725d43251a40130929860305ba3cf54df417b5288820f89ca406e7f84400d372d77b0f5fbccd208f4d738c4d8b933488b3ce0fb47e37820932ef0343f1d
-
SSDEEP
98304:GL9E+Y76D/jak6xrxOEnzPca0n5rK/iS:C9a7C/pUr730nmi
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-