General
-
Target
FullOption_2.1.exe
-
Size
4.0MB
-
Sample
250306-mvkmzaxks4
-
MD5
2827f985babed58b7225d336befe5d67
-
SHA1
85779be1feec0cbf65f72c4dea9f325145f7b951
-
SHA256
427f01eebd57a85f57641b32672d2b65840319cb1121f2b724406a17cdf4948b
-
SHA512
01ee2a9b40778be0eddabab39402f65825f6e23367dc0c939605b61ba0794f01480c2d62bb9aa6888305c38926b82eca8f5a492e500a734cac240f71cb62d025
-
SSDEEP
98304:nBRyRmb7gVNx01+tlHuAIiPlVB7gF2xplA:neFNxNTH7lsSG
Static task
static1
Behavioral task
behavioral1
Sample
FullOption_2.1.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
popular-specialist.gl.at.ply.gg:39463
-
Install_directory
%AppData%
-
install_file
Services.exe
Targets
-
-
Target
FullOption_2.1.exe
-
Size
4.0MB
-
MD5
2827f985babed58b7225d336befe5d67
-
SHA1
85779be1feec0cbf65f72c4dea9f325145f7b951
-
SHA256
427f01eebd57a85f57641b32672d2b65840319cb1121f2b724406a17cdf4948b
-
SHA512
01ee2a9b40778be0eddabab39402f65825f6e23367dc0c939605b61ba0794f01480c2d62bb9aa6888305c38926b82eca8f5a492e500a734cac240f71cb62d025
-
SSDEEP
98304:nBRyRmb7gVNx01+tlHuAIiPlVB7gF2xplA:neFNxNTH7lsSG
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-