General
-
Target
LOLSA.exe
-
Size
76KB
-
Sample
250304-zyands1ny2
-
MD5
621dcab53a15d786df2dfeb98a8adfb1
-
SHA1
b12ee4ca64b434cc1ab4d69aab3e4775701bfbec
-
SHA256
01e7b0486debabca8a91c3e3fc9681029abac9c5fdee43dc100bf3a63dd787b3
-
SHA512
87861a052238be7ef723ca4b3467a4fb761001756a8449137ca71c50098a3ea00583876021693a325c3f72d83d0aa4a2f584367856ff9ba439679ef068ab091d
-
SSDEEP
1536:OEO2Gh2SX1ntBuH10rogO2Gh2SX1ptBuH10g2r4n:Otvh2SX5tBCXRvh2SXPtBCwy
Static task
static1
Behavioral task
behavioral1
Sample
LOLSA.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
10.0.0.2:12973
10.0.0.2:9999
EfwDU1ytTlCoqnzG
-
install_file
USB.exe
Targets
-
-
Target
LOLSA.exe
-
Size
76KB
-
MD5
621dcab53a15d786df2dfeb98a8adfb1
-
SHA1
b12ee4ca64b434cc1ab4d69aab3e4775701bfbec
-
SHA256
01e7b0486debabca8a91c3e3fc9681029abac9c5fdee43dc100bf3a63dd787b3
-
SHA512
87861a052238be7ef723ca4b3467a4fb761001756a8449137ca71c50098a3ea00583876021693a325c3f72d83d0aa4a2f584367856ff9ba439679ef068ab091d
-
SSDEEP
1536:OEO2Gh2SX1ntBuH10rogO2Gh2SX1ptBuH10g2r4n:Otvh2SX5tBCXRvh2SXPtBCwy
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-