General
-
Target
Output.exe
-
Size
76KB
-
Sample
250304-2q8lkatkt3
-
MD5
3609d5f3be639dfe2c7f3f0e7401b388
-
SHA1
f6720729a2af46c119922183b1932cff8cb2ff49
-
SHA256
ef5217e1b0ebd6fc1a8a75de80230998c30f810be4b594ddc711a587c34e12f7
-
SHA512
0aeb9abec472926d57e2441885cb88344ab5ff479149695ffc2ff394321b2b35301dd2b786d191fe9b8c67046a63baff46aa5c9a08c8934c0132483f46f99bca
-
SSDEEP
1536:71DLyqLA3qC85n5kuObTDLyqIA3qC85n5kuZb72:71DLvLA385n5zO/DLvIA385n5zZe
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
192.168.1.3:9999
0x6vtRiVIhgdKOaX
-
install_file
USB.exe
Targets
-
-
Target
Output.exe
-
Size
76KB
-
MD5
3609d5f3be639dfe2c7f3f0e7401b388
-
SHA1
f6720729a2af46c119922183b1932cff8cb2ff49
-
SHA256
ef5217e1b0ebd6fc1a8a75de80230998c30f810be4b594ddc711a587c34e12f7
-
SHA512
0aeb9abec472926d57e2441885cb88344ab5ff479149695ffc2ff394321b2b35301dd2b786d191fe9b8c67046a63baff46aa5c9a08c8934c0132483f46f99bca
-
SSDEEP
1536:71DLyqLA3qC85n5kuObTDLyqIA3qC85n5kuZb72:71DLvLA385n5zO/DLvIA385n5zZe
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-