General
-
Target
KLO.exe
-
Size
63KB
-
Sample
250123-e5383atmdk
-
MD5
2255b23beefa9f99a65379e5b7fd0a28
-
SHA1
15c941744f825d1d2c538f269cce07d0fa4f8b5f
-
SHA256
5806f43acabf519778b512697aa6fefa13174124aadf7f529a55d812fd83f0fb
-
SHA512
176c88147fc1d34eef3bf933191aa27ae3ec73875abca30ae8adf570b2bce6895229c6217e0f679907671ec4d567fcf899e4f66d0f5e502e5670a3f7c16096e2
-
SSDEEP
1536:zSmz6h5a3qHpPihivUOQaFmb5ACkytqzIOtY8X4EvH:/z6uhSGaFmb2fzIOtHH
Behavioral task
behavioral1
Sample
KLO.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
KLO.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
daily-sexually.gl.at.ply.gg:2131
-
Install_directory
%Temp%
-
install_file
Update.exe
Targets
-
-
Target
KLO.exe
-
Size
63KB
-
MD5
2255b23beefa9f99a65379e5b7fd0a28
-
SHA1
15c941744f825d1d2c538f269cce07d0fa4f8b5f
-
SHA256
5806f43acabf519778b512697aa6fefa13174124aadf7f529a55d812fd83f0fb
-
SHA512
176c88147fc1d34eef3bf933191aa27ae3ec73875abca30ae8adf570b2bce6895229c6217e0f679907671ec4d567fcf899e4f66d0f5e502e5670a3f7c16096e2
-
SSDEEP
1536:zSmz6h5a3qHpPihivUOQaFmb5ACkytqzIOtY8X4EvH:/z6uhSGaFmb2fzIOtHH
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-