General
-
Target
absa.exe
-
Size
40KB
-
Sample
250119-cczdas1pft
-
MD5
460e1f1c0c297bbc5c338c845cc6cab3
-
SHA1
4d878c9c30bffaad9294f1b64ebe4195a0aa539e
-
SHA256
8b430fe278d3c9171af077e49b811e0b3df67e34f5eb45dad3de66ed43b857be
-
SHA512
90884dcb3b5b40a137ee2e0b6061d988f920d6932b38617d2be168333ccbb1dab320c2ea08176bbc1bddeb221314cd112db771e0dd8e4cc839b18620e5d92860
-
SSDEEP
768:NF02rc6FGMWmMAOCpwtF5Pf95eOMhR3/p:NFM4G97AOCpIFB95eOMvR
Behavioral task
behavioral1
Sample
absa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
absa.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:1319
147.185.221.25:1319
0TSKzYpDexjIVmkQ
-
Install_directory
%AppData%
-
install_file
Update.exe
Targets
-
-
Target
absa.exe
-
Size
40KB
-
MD5
460e1f1c0c297bbc5c338c845cc6cab3
-
SHA1
4d878c9c30bffaad9294f1b64ebe4195a0aa539e
-
SHA256
8b430fe278d3c9171af077e49b811e0b3df67e34f5eb45dad3de66ed43b857be
-
SHA512
90884dcb3b5b40a137ee2e0b6061d988f920d6932b38617d2be168333ccbb1dab320c2ea08176bbc1bddeb221314cd112db771e0dd8e4cc839b18620e5d92860
-
SSDEEP
768:NF02rc6FGMWmMAOCpwtF5Pf95eOMhR3/p:NFM4G97AOCpIFB95eOMvR
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-