General
-
Target
aimer.cpython-311.pyc
-
Size
13KB
-
Sample
241112-x7nv9sykfx
-
MD5
593b5193f93bf9adb2da69ff24642e6f
-
SHA1
8ebceac2699a9f43b09a91702c431a716a10bece
-
SHA256
20ea21a3ee873d2e7d758697be5dd05e4e66bfe667f058f15fab8a8949de964e
-
SHA512
b4019caf3f69d2782399bbdda140f5ed3a73ca6ee3c6dd3356f31690a823e093e17ead2940b2888183604925fedbcb0f612bab4d7ecf452963e1744c0368d461
-
SSDEEP
384:tfrS+F/0V4EIN4jHp9BQtQpI2wYreehc4eMf:BrZN0vINeti2wYreeBVf
Static task
static1
Malware Config
Extracted
xworm
127.0.0.1:10178
wireless-drunk.gl.at.ply.gg:10178
127.0.0.1:15304
parents-hundred.gl.at.ply.gg:15304
-
Install_directory
%ProgramData%
-
install_file
dllhost.exe
Targets
-
-
Target
aimer.cpython-311.pyc
-
Size
13KB
-
MD5
593b5193f93bf9adb2da69ff24642e6f
-
SHA1
8ebceac2699a9f43b09a91702c431a716a10bece
-
SHA256
20ea21a3ee873d2e7d758697be5dd05e4e66bfe667f058f15fab8a8949de964e
-
SHA512
b4019caf3f69d2782399bbdda140f5ed3a73ca6ee3c6dd3356f31690a823e093e17ead2940b2888183604925fedbcb0f612bab4d7ecf452963e1744c0368d461
-
SSDEEP
384:tfrS+F/0V4EIN4jHp9BQtQpI2wYreehc4eMf:BrZN0vINeti2wYreeBVf
-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-