General
-
Target
ExodusWallet.zip
-
Size
54.1MB
-
Sample
250306-2xp3ssy1dx
-
MD5
0cf76bda289fe2a0f47dd6ae4d8e5c92
-
SHA1
7ec6f979cd7920d2017a658f0d86ba49c4f8c2e7
-
SHA256
8307d06013e9072761237a4432ef62e3cb02ad28e16eae71d9e4191c002dcb44
-
SHA512
1704d48b027da2a20f599b368000a37272e7ba15b9f051fd1ab9c26ec57da8c84f20dabd118aab8cfeb4b81a8e193890cb9ac845af5dda67d418494919c875fc
-
SSDEEP
1572864:QNV4NFAUmDbtJ3zM/zO8wyQso0jWzan/coE5:g5UKAq8nQJTa/coE5
Static task
static1
Behavioral task
behavioral1
Sample
ExodusWallet.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
ExodusWallet.zip
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
xworm
5.0
137.184.74.73:5000
Y2rnj2CSRObOXXLb
-
Install_directory
%ProgramData%
-
install_file
System.exe
Targets
-
-
Target
ExodusWallet.zip
-
Size
54.1MB
-
MD5
0cf76bda289fe2a0f47dd6ae4d8e5c92
-
SHA1
7ec6f979cd7920d2017a658f0d86ba49c4f8c2e7
-
SHA256
8307d06013e9072761237a4432ef62e3cb02ad28e16eae71d9e4191c002dcb44
-
SHA512
1704d48b027da2a20f599b368000a37272e7ba15b9f051fd1ab9c26ec57da8c84f20dabd118aab8cfeb4b81a8e193890cb9ac845af5dda67d418494919c875fc
-
SSDEEP
1572864:QNV4NFAUmDbtJ3zM/zO8wyQso0jWzan/coE5:g5UKAq8nQJTa/coE5
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-