General
-
Target
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2
-
Size
1.7MB
-
Sample
250305-k65feavnz8
-
MD5
a378359637b5d95388debc25f568ce9f
-
SHA1
1d88e287db2b9bb659688d8b79e418d7504c3145
-
SHA256
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2
-
SHA512
b500368c49228ff68e5537bd6b743461d111e8eb2ca87020b86c2973a65163787db95dede3a4bbf9b6771159322a37f8112253a356d622a0ed9adfb7e1431fa1
-
SSDEEP
49152:1Djlabwz9Om4Yd3cY6nbdoQi5i1kpMWQQx8:Zqw/4wKoQpWW
Static task
static1
Behavioral task
behavioral1
Sample
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
set-reduces.gl.at.ply.gg:28950
-
Install_directory
%ProgramData%
-
install_file
svchost.exe
Targets
-
-
Target
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2
-
Size
1.7MB
-
MD5
a378359637b5d95388debc25f568ce9f
-
SHA1
1d88e287db2b9bb659688d8b79e418d7504c3145
-
SHA256
ccc8b0785fbfe6d9e9aeb55db3d61eda595b21567c12a06a4c15f48b2923baa2
-
SHA512
b500368c49228ff68e5537bd6b743461d111e8eb2ca87020b86c2973a65163787db95dede3a4bbf9b6771159322a37f8112253a356d622a0ed9adfb7e1431fa1
-
SSDEEP
49152:1Djlabwz9Om4Yd3cY6nbdoQi5i1kpMWQQx8:Zqw/4wKoQpWW
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-