General
-
Target
matrixnew mapper.exe
-
Size
4.5MB
-
Sample
250304-yzkdjsy1dv
-
MD5
2661e9a9b063a4d7a96686aa8e4ffa04
-
SHA1
cf6af9701e80fb8000f0820e649e9683f7e0e659
-
SHA256
a3b2fdc9903049997ece0fd5ae96922642477a8ad822c9d8a53d574b8459aca5
-
SHA512
6bda80210f421d64d8a954564689bdb3fc8f8e229e748c0aca846e9ae2f2b7bf24533a85ba22d0d2771f36a88e38d5918b9b387a6224f83301f5eda70bd3bf83
-
SSDEEP
98304:j8E/0PCfmKGyVXme/TglieUxwXvsmpvMvdDXieB:4NPCRGyvslieUcOvdDXiS
Static task
static1
Malware Config
Extracted
xworm
5.0
paul-nw.gl.at.ply.gg:51413
AVvzTAnLyW8qQCcO
-
Install_directory
%AppData%
-
install_file
kev.exe
Targets
-
-
Target
matrixnew mapper.exe
-
Size
4.5MB
-
MD5
2661e9a9b063a4d7a96686aa8e4ffa04
-
SHA1
cf6af9701e80fb8000f0820e649e9683f7e0e659
-
SHA256
a3b2fdc9903049997ece0fd5ae96922642477a8ad822c9d8a53d574b8459aca5
-
SHA512
6bda80210f421d64d8a954564689bdb3fc8f8e229e748c0aca846e9ae2f2b7bf24533a85ba22d0d2771f36a88e38d5918b9b387a6224f83301f5eda70bd3bf83
-
SSDEEP
98304:j8E/0PCfmKGyVXme/TglieUxwXvsmpvMvdDXieB:4NPCRGyvslieUcOvdDXiS
-
Detect Xworm Payload
-
Xworm family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-