General
-
Target
FORNITECHEATS.exe
-
Size
110KB
-
Sample
250126-ge3wqatlhz
-
MD5
75a8734fc3c824ca35076cf207464f3b
-
SHA1
b155f2ab391a48a201325f9b8cfca29f715c6278
-
SHA256
ef54499ab3090303e596e68913d9693590aa9984e076a2a61149eb65d57d8768
-
SHA512
76bcaf6d0314ab5e0636f4620c63d89b77e0d0cc030d227580bd90ec72fcbc74ffb6c020353186c8f0437e4647e11da8fdb231acd761ecf2bbda69a3d2d2a9a5
-
SSDEEP
3072:rYbI6yh0etRYheyF4rdzbKMxIrFvI5gcDMB:cb7HetRYhevdD+rFQ/Q
Static task
static1
Behavioral task
behavioral1
Sample
FORNITECHEATS.exe
Resource
win7-20240729-en
Malware Config
Extracted
xworm
kind-sofa.gl.at.ply.gg:31503
-
Install_directory
%ProgramData%
-
install_file
USB.exe
Targets
-
-
Target
FORNITECHEATS.exe
-
Size
110KB
-
MD5
75a8734fc3c824ca35076cf207464f3b
-
SHA1
b155f2ab391a48a201325f9b8cfca29f715c6278
-
SHA256
ef54499ab3090303e596e68913d9693590aa9984e076a2a61149eb65d57d8768
-
SHA512
76bcaf6d0314ab5e0636f4620c63d89b77e0d0cc030d227580bd90ec72fcbc74ffb6c020353186c8f0437e4647e11da8fdb231acd761ecf2bbda69a3d2d2a9a5
-
SSDEEP
3072:rYbI6yh0etRYheyF4rdzbKMxIrFvI5gcDMB:cb7HetRYhevdD+rFQ/Q
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-