General
-
Target
123e.bat
-
Size
371KB
-
Sample
250123-rfv8daskaw
-
MD5
a525af6701d8e4a594e2994ea870a897
-
SHA1
2306ae5f37d70cc766548310e4f861cb5429b789
-
SHA256
642c23c2a4fdc8ef798b8cd15f01afdc8267f2e86653d189e42e4ffe46768460
-
SHA512
92b04239a02e7fa2c2a3c8aba75b0efd22e8f5fef0b3f50582614b790ff28c9b012e110545d251de1c6d079ee072a73d37df1d719d7dc4628b147c8e12e8c4b8
-
SSDEEP
6144:+L5ako4qqxyFfjAucVx6Nbk9CKAZ/QEqnURfniEEYLyNwTn1Z0AGM63RBpCSkuVi:+taD4qqxKbExWrTZ/QKet2cFMIRB9wvZ
Static task
static1
Behavioral task
behavioral1
Sample
123e.bat
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
xworm
5.0
real-enquiry.gl.at.ply.gg:15403
XMR2SpG5rhnOf6LO
-
Install_directory
%Public%
-
install_file
USB.exe
Targets
-
-
Target
123e.bat
-
Size
371KB
-
MD5
a525af6701d8e4a594e2994ea870a897
-
SHA1
2306ae5f37d70cc766548310e4f861cb5429b789
-
SHA256
642c23c2a4fdc8ef798b8cd15f01afdc8267f2e86653d189e42e4ffe46768460
-
SHA512
92b04239a02e7fa2c2a3c8aba75b0efd22e8f5fef0b3f50582614b790ff28c9b012e110545d251de1c6d079ee072a73d37df1d719d7dc4628b147c8e12e8c4b8
-
SSDEEP
6144:+L5ako4qqxyFfjAucVx6Nbk9CKAZ/QEqnURfniEEYLyNwTn1Z0AGM63RBpCSkuVi:+taD4qqxKbExWrTZ/QKet2cFMIRB9wvZ
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-