General
-
Target
Async Spoofer.exe
-
Size
57KB
-
Sample
241117-yafn3axaqc
-
MD5
61ad698be29af6af78a4d72cbecc612f
-
SHA1
b58f0d473b9aa56b1b0e95322e2cbd4d9c273d12
-
SHA256
12a60961e377b05f0dcd728e1e5f469754c3003c31024db47a83c940bf22b474
-
SHA512
62ce8d5830697dcb2a57d44f3315dd5fcb201f0b8ca59ac95813aae67e0f2f34b99514460bbb49160ee9d80dca679b2be4335b93895a26a1b3cc26ce2d31e606
-
SSDEEP
1536:50reWEbnUcMyU05dvIn7tbbYlsfRadLbekbOeED7:arLQUW5d+bbYlORaR6kbOeA
Malware Config
Extracted
xworm
sep-framing.gl.at.ply.gg:61526
-
install_file
USB.exe
Targets
-
-
Target
Async Spoofer.exe
-
Size
57KB
-
MD5
61ad698be29af6af78a4d72cbecc612f
-
SHA1
b58f0d473b9aa56b1b0e95322e2cbd4d9c273d12
-
SHA256
12a60961e377b05f0dcd728e1e5f469754c3003c31024db47a83c940bf22b474
-
SHA512
62ce8d5830697dcb2a57d44f3315dd5fcb201f0b8ca59ac95813aae67e0f2f34b99514460bbb49160ee9d80dca679b2be4335b93895a26a1b3cc26ce2d31e606
-
SSDEEP
1536:50reWEbnUcMyU05dvIn7tbbYlsfRadLbekbOeED7:arLQUW5d+bbYlORaR6kbOeA
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-