Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 00:50
Behavioral task
behavioral1
Sample
Boostrapper.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
Boostrapper.exe
-
Size
41KB
-
MD5
9ac60ca7a5c5b857665cbebc905f4ee2
-
SHA1
ed1b9591edbc322cb88e3f7ea626ca3741f08e7d
-
SHA256
13183bf3db29665979577690003bddb8e09bdcd28c5d183ea91e95a63a26015d
-
SHA512
625704840bba7b756e408a2bca717cd51c0d5ab69a877613dcedbd4ac871b8447b8bd10e515fb5cc295501318d4ac9f1071adba08df710f9018b15b2db45f82b
-
SSDEEP
768:UBFMiKhUsY5OEGsWyH6pyAuwKFjHvdhtF5PG9+KdOwh53EmXb:n9hikvRyaAAulzvdTFI9+8Owr9Xb
Malware Config
Extracted
Family
xworm
Version
5.0
C2
20.ip.gl.ply.gg:25905
pics-facial.gl.at.ply.gg:25905
Mutex
x8W4SNblRhaish4q
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/2520-1-0x0000000000990000-0x00000000009A0000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 Boostrapper.exe