General
-
Target
F_0a Pahnotom.bat
-
Size
314KB
-
Sample
241111-p72hcssqek
-
MD5
e15c30227305c76972d8ecf85d4b31bc
-
SHA1
d192b94c852427ee1607c1bb45fb504130f66d33
-
SHA256
7096d59bcb168595ff5f95c7eb287ebe8de315f0af34b4d5c78a7363ae24cad5
-
SHA512
30fc1d2fa65d826cfc055be59c729f3a697988830a8e7b9093c088969d43a29fc43798bde7639dc38236f30d40c510bd5502f83244674bbc33a425f3a2a177ca
-
SSDEEP
6144:rS54Nvug0//LU31XygG+Ooyf5z7q3DACE2lq:rqKmX//O1Crou5zADbzq
Static task
static1
Malware Config
Extracted
xworm
135.125.21.87:7000
-
Install_directory
%Temp%
-
install_file
Anticheat.exe
Targets
-
-
Target
F_0a Pahnotom.bat
-
Size
314KB
-
MD5
e15c30227305c76972d8ecf85d4b31bc
-
SHA1
d192b94c852427ee1607c1bb45fb504130f66d33
-
SHA256
7096d59bcb168595ff5f95c7eb287ebe8de315f0af34b4d5c78a7363ae24cad5
-
SHA512
30fc1d2fa65d826cfc055be59c729f3a697988830a8e7b9093c088969d43a29fc43798bde7639dc38236f30d40c510bd5502f83244674bbc33a425f3a2a177ca
-
SSDEEP
6144:rS54Nvug0//LU31XygG+Ooyf5z7q3DACE2lq:rqKmX//O1Crou5zADbzq
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-