General
-
Target
Boostrapper.exe
-
Size
41KB
-
Sample
250307-a64h1a1sdw
-
MD5
9ac60ca7a5c5b857665cbebc905f4ee2
-
SHA1
ed1b9591edbc322cb88e3f7ea626ca3741f08e7d
-
SHA256
13183bf3db29665979577690003bddb8e09bdcd28c5d183ea91e95a63a26015d
-
SHA512
625704840bba7b756e408a2bca717cd51c0d5ab69a877613dcedbd4ac871b8447b8bd10e515fb5cc295501318d4ac9f1071adba08df710f9018b15b2db45f82b
-
SSDEEP
768:UBFMiKhUsY5OEGsWyH6pyAuwKFjHvdhtF5PG9+KdOwh53EmXb:n9hikvRyaAAulzvdTFI9+8Owr9Xb
Behavioral task
behavioral1
Sample
Boostrapper.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
20.ip.gl.ply.gg:25905
pics-facial.gl.at.ply.gg:25905
x8W4SNblRhaish4q
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Boostrapper.exe
-
Size
41KB
-
MD5
9ac60ca7a5c5b857665cbebc905f4ee2
-
SHA1
ed1b9591edbc322cb88e3f7ea626ca3741f08e7d
-
SHA256
13183bf3db29665979577690003bddb8e09bdcd28c5d183ea91e95a63a26015d
-
SHA512
625704840bba7b756e408a2bca717cd51c0d5ab69a877613dcedbd4ac871b8447b8bd10e515fb5cc295501318d4ac9f1071adba08df710f9018b15b2db45f82b
-
SSDEEP
768:UBFMiKhUsY5OEGsWyH6pyAuwKFjHvdhtF5PG9+KdOwh53EmXb:n9hikvRyaAAulzvdTFI9+8Owr9Xb
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-