General
-
Target
Algorithm_Converter_Arab-you (2).exe
-
Size
497KB
-
Sample
250307-lsv59aypy6
-
MD5
19ab3a28f430378150bb4a7afc2a5a5e
-
SHA1
24f62552fb20cb81fb2b3a1521f698b9b7f58848
-
SHA256
e0e8dc309849f9da9ff2aaf5394a267748b5a5c0009ace4d2873726c80ed0eec
-
SHA512
9781a3b465176fa88d7883bad64661672472bc77e42fc145d92524f86bf11eec57be11ab885de01539085cff292fb0051bc2bf59366b8437c0d788caf1d9d900
-
SSDEEP
12288:PGMnkN1TDTvX7ym4vw+8ixjvrWem7kC+8:nG1TDTvLVkrrTm
Static task
static1
Malware Config
Extracted
xworm
3.0
3skr.uncofig.com:9999
f5nPSEGIk3s9ZJvj
-
Install_directory
%AppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7942324376:AAFz5Z-GdKIj1CePZyqIUmvNWOymMRw8Lmk/sendMessage?chat_id=2078478344
Targets
-
-
Target
Algorithm_Converter_Arab-you (2).exe
-
Size
497KB
-
MD5
19ab3a28f430378150bb4a7afc2a5a5e
-
SHA1
24f62552fb20cb81fb2b3a1521f698b9b7f58848
-
SHA256
e0e8dc309849f9da9ff2aaf5394a267748b5a5c0009ace4d2873726c80ed0eec
-
SHA512
9781a3b465176fa88d7883bad64661672472bc77e42fc145d92524f86bf11eec57be11ab885de01539085cff292fb0051bc2bf59366b8437c0d788caf1d9d900
-
SSDEEP
12288:PGMnkN1TDTvX7ym4vw+8ixjvrWem7kC+8:nG1TDTvLVkrrTm
-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-