General
-
Target
extfix.exe
-
Size
75KB
-
Sample
241120-x62qqssell
-
MD5
03ac7cea640de499ffd4d820cbf91aec
-
SHA1
c5431178ad49172a65398770a03fecccc37f711f
-
SHA256
c6ac39bb6bd04c72e7c1f23b6d98b7a3ae591efa9ef285458b27bef353a255cb
-
SHA512
52186a0938de15b83873626f72f594219dc193b1d5b7fbec5d2577761488f3379d5cd42e6de205964f6dec5cdfc3023de36375da28a0146a5311ab0516f23d7c
-
SSDEEP
1536:2L1YZRemnhY0X1+Q3jaHPjbIbnFJ8v6sqKoO4o0iD8:22ZPhhzOHobnv6oOz0iA
Behavioral task
behavioral1
Sample
extfix.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
127.0.0.1:64112
FRERE-57054.portmap.host:64112
solutions-stunning.gl.at.ply.gg:64112:64112
solutions-stunning.gl.at.ply.gg:64112
-
Install_directory
%Public%
-
install_file
XClient.exe
Targets
-
-
Target
extfix.exe
-
Size
75KB
-
MD5
03ac7cea640de499ffd4d820cbf91aec
-
SHA1
c5431178ad49172a65398770a03fecccc37f711f
-
SHA256
c6ac39bb6bd04c72e7c1f23b6d98b7a3ae591efa9ef285458b27bef353a255cb
-
SHA512
52186a0938de15b83873626f72f594219dc193b1d5b7fbec5d2577761488f3379d5cd42e6de205964f6dec5cdfc3023de36375da28a0146a5311ab0516f23d7c
-
SSDEEP
1536:2L1YZRemnhY0X1+Q3jaHPjbIbnFJ8v6sqKoO4o0iD8:22ZPhhzOHobnv6oOz0iA
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-