General
-
Target
Bloxstrap-v2.8.1.exe
-
Size
11.2MB
-
Sample
241122-wljtra1maq
-
MD5
5d16971f4e0d6e5f99d18d28672cc621
-
SHA1
bcd7f4fe26313fe3ced6ced1f5952d6429fac416
-
SHA256
fc16219abe3f5272052e7238be66431e1d1b3e7d2faf996c701ce576cce74290
-
SHA512
fae8a171467bb1e33f4920f93a9defdc5743d478d5c90446b43132ea1d45aaa7edf1ebbfce4b8ed27a8a70c9197492a4dc7694cf2a411a46f563b28dcd5668c9
-
SSDEEP
196608:ISHBLJKbIWxA63vYjVQ4SvrOXvH0RG1jT7ub1EBKnQtD794BYb:FBVKNAGvcmTWUc1jT7FKnyJ
Static task
static1
Behavioral task
behavioral1
Sample
Bloxstrap-v2.8.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bloxstrap-v2.8.1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
192.168.68.139:2068
tell-outcome.gl.at.ply.gg:2068
SXJOPv2u5QpF0aEa
-
Install_directory
%AppData%
-
install_file
FileExplorer.exe
Targets
-
-
Target
Bloxstrap-v2.8.1.exe
-
Size
11.2MB
-
MD5
5d16971f4e0d6e5f99d18d28672cc621
-
SHA1
bcd7f4fe26313fe3ced6ced1f5952d6429fac416
-
SHA256
fc16219abe3f5272052e7238be66431e1d1b3e7d2faf996c701ce576cce74290
-
SHA512
fae8a171467bb1e33f4920f93a9defdc5743d478d5c90446b43132ea1d45aaa7edf1ebbfce4b8ed27a8a70c9197492a4dc7694cf2a411a46f563b28dcd5668c9
-
SSDEEP
196608:ISHBLJKbIWxA63vYjVQ4SvrOXvH0RG1jT7ub1EBKnQtD794BYb:FBVKNAGvcmTWUc1jT7FKnyJ
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-