General
-
Target
Vclient3.12-loader.bat
-
Size
337KB
-
Sample
250304-dzgx7syscy
-
MD5
b0b26501fa33bc553f9a54ca28a89a85
-
SHA1
9f868d7d464375d1ea60c5234f4dd057ea85fce1
-
SHA256
f60cc29ba04d75d31227e8f0417640ed962d2cbfb537072b1b00aa89df9be473
-
SHA512
fcd9680de0ce271730f9cc5968d3172ed03e2463e53af66b19c898e7ac0e6c97717f8948d27e329f30f78ba051bb4a81acb4dc837ce602964e64470a6a0f3069
-
SSDEEP
6144:7rVhpfca9iHDDTI3nozeFFDNwPlxR+RG7PrwzZ0qw/FU1qBIEhY:dbaHDunIxoRWrOZ05U11EhY
Static task
static1
Behavioral task
behavioral1
Sample
Vclient3.12-loader.bat
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
xworm
45.88.91.55:8893
-
Install_directory
%ProgramData%
-
install_file
sys-32.exe
Targets
-
-
Target
Vclient3.12-loader.bat
-
Size
337KB
-
MD5
b0b26501fa33bc553f9a54ca28a89a85
-
SHA1
9f868d7d464375d1ea60c5234f4dd057ea85fce1
-
SHA256
f60cc29ba04d75d31227e8f0417640ed962d2cbfb537072b1b00aa89df9be473
-
SHA512
fcd9680de0ce271730f9cc5968d3172ed03e2463e53af66b19c898e7ac0e6c97717f8948d27e329f30f78ba051bb4a81acb4dc837ce602964e64470a6a0f3069
-
SSDEEP
6144:7rVhpfca9iHDDTI3nozeFFDNwPlxR+RG7PrwzZ0qw/FU1qBIEhY:dbaHDunIxoRWrOZ05U11EhY
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-