General
-
Target
VixenPrivate.exe
-
Size
63KB
-
Sample
241229-1sv8ksxrbj
-
MD5
52d017d32bef7cffcb7ff98571736a97
-
SHA1
f0764f6bec89063594e5afcf2233d586da2fa999
-
SHA256
20e65c2d214ec536e42d4ce447afaa253b5cd9293fcd759e64023dd891dab6f2
-
SHA512
538ea5e3b6516b63fe803a6e158b00a286fa3016df24a25f59e6a9b1ff3b01ad7876aff3efb8d474cf410d22db7b745698be46f6ae1f11ae819590607a2b999f
-
SSDEEP
1536:SwXz4zflrUYJYUbBh9bFq7+MOGxuUdpqKmY7:SkUlbYUbBeFfGz
Behavioral task
behavioral1
Sample
VixenPrivate.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
Default
100.37.20.232:4872
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
100.37.20.232:4872
-
Install_directory
%LocalAppData%
-
install_file
XClient.exe
Targets
-
-
Target
VixenPrivate.exe
-
Size
63KB
-
MD5
52d017d32bef7cffcb7ff98571736a97
-
SHA1
f0764f6bec89063594e5afcf2233d586da2fa999
-
SHA256
20e65c2d214ec536e42d4ce447afaa253b5cd9293fcd759e64023dd891dab6f2
-
SHA512
538ea5e3b6516b63fe803a6e158b00a286fa3016df24a25f59e6a9b1ff3b01ad7876aff3efb8d474cf410d22db7b745698be46f6ae1f11ae819590607a2b999f
-
SSDEEP
1536:SwXz4zflrUYJYUbBh9bFq7+MOGxuUdpqKmY7:SkUlbYUbBeFfGz
-
Asyncrat family
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-