General
-
Target
Dcontrole.exe
-
Size
799KB
-
Sample
250302-y5d4qatqt9
-
MD5
32301a56c3e1fc14a7fe9e6ea9f80cd8
-
SHA1
4bc0bee339074032915689b79b47c37dd25d4192
-
SHA256
f5a7f371f5e9a2e95aabaf891a54722fe87c97c408f04664f0eceed898c6f390
-
SHA512
5b50c697b898bb1c83b464eb6f2e45af3b6dcf47b4c0938ca5171f700e4933aa1299397d4f0c2af92aa7e4950a60e9321d861fef5f4a8e7c379a406dede7b371
-
SSDEEP
24576:32HY+jy+iVKG0r5Qql4B71qQoM/eKR6UZun6:32HY8UKG0aMwe5U0n6
Static task
static1
Malware Config
Extracted
xworm
2.tcp.eu.ngrok.io:1800
2.tcp.eu.ngrok.io:18000
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7911535650:AAEUAqRiUefpOJv3v-yDVQta9ZM8Lvmwl88/sendMessage?chat_id=6426180826
Targets
-
-
Target
Dcontrole.exe
-
Size
799KB
-
MD5
32301a56c3e1fc14a7fe9e6ea9f80cd8
-
SHA1
4bc0bee339074032915689b79b47c37dd25d4192
-
SHA256
f5a7f371f5e9a2e95aabaf891a54722fe87c97c408f04664f0eceed898c6f390
-
SHA512
5b50c697b898bb1c83b464eb6f2e45af3b6dcf47b4c0938ca5171f700e4933aa1299397d4f0c2af92aa7e4950a60e9321d861fef5f4a8e7c379a406dede7b371
-
SSDEEP
24576:32HY+jy+iVKG0r5Qql4B71qQoM/eKR6UZun6:32HY8UKG0aMwe5U0n6
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-