General
-
Target
33554031f9ec302ee6640380fd88bc0aaea328591789d51e3a4b531e6ae17d89.bat
-
Size
92KB
-
Sample
250227-c3twhasnw8
-
MD5
56156e92af196e2d50b95a298ccd72c6
-
SHA1
1a4813b0824e7b3ce1cb1da6fe1f232548d8159c
-
SHA256
33554031f9ec302ee6640380fd88bc0aaea328591789d51e3a4b531e6ae17d89
-
SHA512
effb4585ff014a84b7afeb5906c93781f4514db528c0e11afd280b6d663a709042d8e668b9e3b87deeb4feb7de7110eb4b50eb37259991b4108ce6fef821651d
-
SSDEEP
1536:S2ieY0tuOX7Y3kT/veAk9eezSbyMLPlM4F0CkmelJjXW:CBmuW8UmkezSHLoCElA
Static task
static1
Behavioral task
behavioral1
Sample
33554031f9ec302ee6640380fd88bc0aaea328591789d51e3a4b531e6ae17d89.bat
Resource
win7-20240729-en
Malware Config
Extracted
xworm
5.0
45.88.186.152:4782
l1nSXpa16rjW1V1V
-
Install_directory
%Userprofile%
-
install_file
WinData.exe
Targets
-
-
Target
33554031f9ec302ee6640380fd88bc0aaea328591789d51e3a4b531e6ae17d89.bat
-
Size
92KB
-
MD5
56156e92af196e2d50b95a298ccd72c6
-
SHA1
1a4813b0824e7b3ce1cb1da6fe1f232548d8159c
-
SHA256
33554031f9ec302ee6640380fd88bc0aaea328591789d51e3a4b531e6ae17d89
-
SHA512
effb4585ff014a84b7afeb5906c93781f4514db528c0e11afd280b6d663a709042d8e668b9e3b87deeb4feb7de7110eb4b50eb37259991b4108ce6fef821651d
-
SSDEEP
1536:S2ieY0tuOX7Y3kT/veAk9eezSbyMLPlM4F0CkmelJjXW:CBmuW8UmkezSHLoCElA
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-