General
-
Target
2ZRahoFPSz5NUBY.exe
-
Size
2.9MB
-
Sample
250306-vxcn5strv4
-
MD5
551bdc94c503bfeffe46d96eb21484f8
-
SHA1
b7313d730bb8f08774977229229d167dd272ce82
-
SHA256
413f81b625d636a96eeb41de781c777c5294e7f8f5c714a1921d005e7f46800b
-
SHA512
32d07f233f3b66a8863747b1239648e0154f17bbc9f5453a7dbbcbcb12263da31d8bed2e1194a634c8c2174635223e1abfe50bbd873ee3f60f37f77e8fb3ea59
-
SSDEEP
49152:ULkjyaZH575syNqACjngmISzn5TfBDgTZUJ4crvFnXI6Txjj5eHKf:ULkjyaZH5iyNqlTvfRvhI6Fj5IK
Static task
static1
Behavioral task
behavioral1
Sample
2ZRahoFPSz5NUBY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ZRahoFPSz5NUBY.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
127.0.0.1:12830
technical-tract.gl.at.ply.gg:12830
-
Install_directory
%LocalAppData%
-
install_file
PyslionV1.exe
Targets
-
-
Target
2ZRahoFPSz5NUBY.exe
-
Size
2.9MB
-
MD5
551bdc94c503bfeffe46d96eb21484f8
-
SHA1
b7313d730bb8f08774977229229d167dd272ce82
-
SHA256
413f81b625d636a96eeb41de781c777c5294e7f8f5c714a1921d005e7f46800b
-
SHA512
32d07f233f3b66a8863747b1239648e0154f17bbc9f5453a7dbbcbcb12263da31d8bed2e1194a634c8c2174635223e1abfe50bbd873ee3f60f37f77e8fb3ea59
-
SSDEEP
49152:ULkjyaZH575syNqACjngmISzn5TfBDgTZUJ4crvFnXI6Txjj5eHKf:ULkjyaZH5iyNqlTvfRvhI6Fj5IK
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-