General
-
Target
DISK WOOF.bat
-
Size
293KB
-
Sample
250126-gawa3stlat
-
MD5
bff3ba161e02cc0978e9c03f9260bb0f
-
SHA1
e21f8195770e99123e78f58fea37391fb87e60d3
-
SHA256
ac61e90dbcbac2af4b225a840f4beb1d5f34ad49955f02fd4d8a96469f87e5b5
-
SHA512
69b1e86a937bd2dc8943958d19af1c72f01e650e73fe0d1d5d01c7fbe5da525df0789968b1ec19a0337b4afc8491d52d314e171942af252b9110b02b31bc9070
-
SSDEEP
6144:6vP83Z7z/IiptJe0HrsOl3eC9P8/5w3s+bABtoqi77eXh:K83Z7z93rzl3eYP5UB+77eXh
Static task
static1
Behavioral task
behavioral1
Sample
DISK WOOF.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
kind-sofa.gl.at.ply.gg:31503
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Targets
-
-
Target
DISK WOOF.bat
-
Size
293KB
-
MD5
bff3ba161e02cc0978e9c03f9260bb0f
-
SHA1
e21f8195770e99123e78f58fea37391fb87e60d3
-
SHA256
ac61e90dbcbac2af4b225a840f4beb1d5f34ad49955f02fd4d8a96469f87e5b5
-
SHA512
69b1e86a937bd2dc8943958d19af1c72f01e650e73fe0d1d5d01c7fbe5da525df0789968b1ec19a0337b4afc8491d52d314e171942af252b9110b02b31bc9070
-
SSDEEP
6144:6vP83Z7z/IiptJe0HrsOl3eC9P8/5w3s+bABtoqi77eXh:K83Z7z93rzl3eYP5UB+77eXh
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Deletes itself
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-