General
-
Target
2AGI4_random.exe
-
Size
1.4MB
-
Sample
250126-qrnr1asnay
-
MD5
ebe8a0f61f53a3817c3fbcc3ab3a1f4c
-
SHA1
d87d66d53f29464d1f32b2c1e3b7ce507c51c40d
-
SHA256
27f53d6d1b4f4edb6c517ac1a517a4e9158d5d96eeccfd324c925d3772c3f44c
-
SHA512
33138b6fc03af9598821377dfdacaad64a56b7a05e7c7ae48de958e0002c8eec695e49633aec8be212be321f525ca165e40abf81bf0c69a57a0582f94698385b
-
SSDEEP
24576:HMjhUS5MaULo18LoNubLFwUoTh+tasCU1Yc0zRgYEz405bmktUNudtJjdPrF:6t5CLQ8sNg9oThYoic27cab7SNudXjdZ
Static task
static1
Behavioral task
behavioral1
Sample
2AGI4_random.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
91.212.166.99:4404
f35pmRFzPiiasEf1
-
Install_directory
%LocalAppData%
-
install_file
dllhost.exe
Targets
-
-
Target
2AGI4_random.exe
-
Size
1.4MB
-
MD5
ebe8a0f61f53a3817c3fbcc3ab3a1f4c
-
SHA1
d87d66d53f29464d1f32b2c1e3b7ce507c51c40d
-
SHA256
27f53d6d1b4f4edb6c517ac1a517a4e9158d5d96eeccfd324c925d3772c3f44c
-
SHA512
33138b6fc03af9598821377dfdacaad64a56b7a05e7c7ae48de958e0002c8eec695e49633aec8be212be321f525ca165e40abf81bf0c69a57a0582f94698385b
-
SSDEEP
24576:HMjhUS5MaULo18LoNubLFwUoTh+tasCU1Yc0zRgYEz405bmktUNudtJjdPrF:6t5CLQ8sNg9oThYoic27cab7SNudXjdZ
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-