General
-
Target
84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450N.exe
-
Size
9KB
-
Sample
250121-ghj8sayqhk
-
MD5
0df8781dad511830d4722e2f140f6c60
-
SHA1
e69045c7a0270aff84dafcd813c05ffbb4c7a20c
-
SHA256
84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450
-
SHA512
653e7550359149b2e383b360a83f0e2bda7e1f14e2e23c8c7296e1c5f865bb83599d550b916c8d2dd6afbef072a17f119f03bc33c51cdf7ce9abb70caf24f3eb
-
SSDEEP
192:kmGhMITEquCA/a1zbhQ5rycbXfrxQNsWkhbv8EFm/Q:km7rquN/a1zbIryePraXkhIl/
Static task
static1
Behavioral task
behavioral1
Sample
84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450N.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
147.185.221.25:18007
-
Install_directory
%AppData%
-
install_file
svc.exe
-
telegram
https://api.telegram.org/bot7958612105:AAHSNEPMuFgiaNh4WYBmEL8ysE2Ek6JH2i4/sendMessage?chat_id=8093935255
Targets
-
-
Target
84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450N.exe
-
Size
9KB
-
MD5
0df8781dad511830d4722e2f140f6c60
-
SHA1
e69045c7a0270aff84dafcd813c05ffbb4c7a20c
-
SHA256
84d354f7018370bba012bf66ed07844fb96f8f59884f1d102ef46794d650b450
-
SHA512
653e7550359149b2e383b360a83f0e2bda7e1f14e2e23c8c7296e1c5f865bb83599d550b916c8d2dd6afbef072a17f119f03bc33c51cdf7ce9abb70caf24f3eb
-
SSDEEP
192:kmGhMITEquCA/a1zbhQ5rycbXfrxQNsWkhbv8EFm/Q:km7rquN/a1zbIryePraXkhIl/
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-