General
-
Target
ExodusWallet.zip
-
Size
54.1MB
-
Sample
250307-16gmcayscs
-
MD5
0cf76bda289fe2a0f47dd6ae4d8e5c92
-
SHA1
7ec6f979cd7920d2017a658f0d86ba49c4f8c2e7
-
SHA256
8307d06013e9072761237a4432ef62e3cb02ad28e16eae71d9e4191c002dcb44
-
SHA512
1704d48b027da2a20f599b368000a37272e7ba15b9f051fd1ab9c26ec57da8c84f20dabd118aab8cfeb4b81a8e193890cb9ac845af5dda67d418494919c875fc
-
SSDEEP
1572864:QNV4NFAUmDbtJ3zM/zO8wyQso0jWzan/coE5:g5UKAq8nQJTa/coE5
Static task
static1
Behavioral task
behavioral1
Sample
ExodusLoader.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
137.184.74.73:5000
Y2rnj2CSRObOXXLb
-
Install_directory
%ProgramData%
-
install_file
System.exe
Targets
-
-
Target
ExodusLoader.exe
-
Size
89KB
-
MD5
2f3405fa61bec944ed9d869adb6a37e3
-
SHA1
4a3c839b899809ba89a99eaadecf4da6d71e8256
-
SHA256
ee854407da3d172d442c9aec8861d9e8fd4f7a5f8c4cbb785d7e55549a507234
-
SHA512
72c8309a2c439adb3790aaf7198d5cdfa5591703a039ca84982752dfc43213a94885aab5a82fc0cfd78e161a792d2c1684e0cae7e4e7d772cc98be4aabdc33c0
-
SSDEEP
1536:77fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfAwWOn:X7DhdC6kzWypvaQ0FxyNTBfAg
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-