General
-
Target
Infectedare.bat
-
Size
370KB
-
Sample
250121-2qt36svrcl
-
MD5
e671e31016657dd61b18872fbfcfd772
-
SHA1
2944b453f4e811ef50374b0de7a8eec3fd056245
-
SHA256
f1114a9029232440f9a4ffe7590772b4f7e331858a0654667239c480d1891083
-
SHA512
3ed8b4bdb0beb9c85ae10ae41b26efa103c0e789389547a2c4cc1e459d70cf6a83a3c69d448ad0a913721395acb82908ab64c6967e7103a445665f75b7410568
-
SSDEEP
6144:O87ZMusUnaeMl3lQS6v0hD6FJn1PKhCTy4hshu0gClRQXK0U:OwVHnL0lQFG671iPs2Q6J
Static task
static1
Behavioral task
behavioral1
Sample
Infectedare.bat
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
5.0
real-enquiry.gl.at.ply.gg:15403
Twor9QJPgxqGUGz9
-
Install_directory
%Public%
-
install_file
USB.exe
Targets
-
-
Target
Infectedare.bat
-
Size
370KB
-
MD5
e671e31016657dd61b18872fbfcfd772
-
SHA1
2944b453f4e811ef50374b0de7a8eec3fd056245
-
SHA256
f1114a9029232440f9a4ffe7590772b4f7e331858a0654667239c480d1891083
-
SHA512
3ed8b4bdb0beb9c85ae10ae41b26efa103c0e789389547a2c4cc1e459d70cf6a83a3c69d448ad0a913721395acb82908ab64c6967e7103a445665f75b7410568
-
SSDEEP
6144:O87ZMusUnaeMl3lQS6v0hD6FJn1PKhCTy4hshu0gClRQXK0U:OwVHnL0lQFG671iPs2Q6J
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-