General
-
Target
resthiemailmatrix.hub.exe
-
Size
118KB
-
Sample
250305-zhrlzax1gy
-
MD5
7fc47d0f79e8bbb131e947beb67538ef
-
SHA1
b374cf5bfa41740e6a541e1f558a9e400720493a
-
SHA256
70fdf77f0aaca97b95c87bd9f31b0dda0f5c552b156e3788c9768dace10837f1
-
SHA512
9d5b848d0c9075b2240d7fbda92346a5a9506e9a0689f47e185be4998442fba14f2854dfe4f794dc6bb8dbdad66927ae3fe20a3e92945b81367ddc8c9661ecb2
-
SSDEEP
1536:cQowDILgxGY+lzyUF5g/PE3CfLSFUdo+e/erRMRsI0PiCxdm6fueNWa/FFr2DYi:1pGY+l1OUaLSFR+nsm5r+F
Static task
static1
Behavioral task
behavioral1
Sample
resthiemailmatrix.hub.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
paul-nw.gl.at.ply.gg:3111
F4I7I2sWyinFgipq
-
Install_directory
%AppData%
-
install_file
kev.exe
Targets
-
-
Target
resthiemailmatrix.hub.exe
-
Size
118KB
-
MD5
7fc47d0f79e8bbb131e947beb67538ef
-
SHA1
b374cf5bfa41740e6a541e1f558a9e400720493a
-
SHA256
70fdf77f0aaca97b95c87bd9f31b0dda0f5c552b156e3788c9768dace10837f1
-
SHA512
9d5b848d0c9075b2240d7fbda92346a5a9506e9a0689f47e185be4998442fba14f2854dfe4f794dc6bb8dbdad66927ae3fe20a3e92945b81367ddc8c9661ecb2
-
SSDEEP
1536:cQowDILgxGY+lzyUF5g/PE3CfLSFUdo+e/erRMRsI0PiCxdm6fueNWa/FFr2DYi:1pGY+l1OUaLSFR+nsm5r+F
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-