General
-
Target
quietcc.exe
-
Size
66KB
-
Sample
250302-c7sh8sskw6
-
MD5
8cce9d9b2604324a3fd73f16c1e57946
-
SHA1
611063dc8e949921502e91df4345069c0eb423b1
-
SHA256
9367a5b73fe3638560cc35e6343fab1375547f608e55f02ad185c15f35421c73
-
SHA512
e82d7d6ebf983e904b2a6aebb04d5c8b7dd5fe4329166d2f10341791172f2c461d8fafeef05d754c305c7b25fae72de7d12cf139e0116ff0b692275bca4e8652
-
SSDEEP
1536:va9We/cGq+OEJXdKtfbo0Ac06wLYUfO+KHL9Gs:uOEqtfbohhO+KH5Gs
Behavioral task
behavioral1
Sample
quietcc.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
127.0.0.1:4010
countries-allowed.gl.at.ply.gg:4010
-
Install_directory
%ProgramData%
-
install_file
RobloxPlayerBeta.exe
Targets
-
-
Target
quietcc.exe
-
Size
66KB
-
MD5
8cce9d9b2604324a3fd73f16c1e57946
-
SHA1
611063dc8e949921502e91df4345069c0eb423b1
-
SHA256
9367a5b73fe3638560cc35e6343fab1375547f608e55f02ad185c15f35421c73
-
SHA512
e82d7d6ebf983e904b2a6aebb04d5c8b7dd5fe4329166d2f10341791172f2c461d8fafeef05d754c305c7b25fae72de7d12cf139e0116ff0b692275bca4e8652
-
SSDEEP
1536:va9We/cGq+OEJXdKtfbo0Ac06wLYUfO+KHL9Gs:uOEqtfbohhO+KH5Gs
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-