General
-
Target
BootstrapperNe.exe
-
Size
3.0MB
-
Sample
250305-b2e6aavte1
-
MD5
2db7ca48c2862fe3c8ffefb50b7f975b
-
SHA1
09e61b2d5d3876fc0c8030e075745f89289fb876
-
SHA256
ceb91d9b072597d9adad98e6b7ffc3a6593d362ded0fbe8d1bab4cb8460d3cdf
-
SHA512
d9e937061fc8eabb75068d78863f7045e626ba26261a526bb59b0e2fb0010d38b520c19fad9e8bfc67ee943c4669866970728ae006afd73986fd4af0a3e866fa
-
SSDEEP
49152:ZirspxuZcd9LG5IUNKbFHEwJSRmM/ZUqz2xZM4REPG5B/V1LUuOfW7eVbEJqMEuU:ZigpxuqdFG5dNKJdJSRmM/uqSxZM4RE+
Static task
static1
Malware Config
Extracted
xworm
127.0.0.1:5467
google-rocks.gl.at.ply.gg:5467
-
Install_directory
%AppData%
-
install_file
svchost.exe
Targets
-
-
Target
BootstrapperNe.exe
-
Size
3.0MB
-
MD5
2db7ca48c2862fe3c8ffefb50b7f975b
-
SHA1
09e61b2d5d3876fc0c8030e075745f89289fb876
-
SHA256
ceb91d9b072597d9adad98e6b7ffc3a6593d362ded0fbe8d1bab4cb8460d3cdf
-
SHA512
d9e937061fc8eabb75068d78863f7045e626ba26261a526bb59b0e2fb0010d38b520c19fad9e8bfc67ee943c4669866970728ae006afd73986fd4af0a3e866fa
-
SSDEEP
49152:ZirspxuZcd9LG5IUNKbFHEwJSRmM/ZUqz2xZM4REPG5B/V1LUuOfW7eVbEJqMEuU:ZigpxuqdFG5dNKJdJSRmM/uqSxZM4RE+
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-