General
-
Target
RealtekAudioDriverInstall.exe
-
Size
40KB
-
Sample
250307-zab7bawpw9
-
MD5
54a6f585c5d3483cb50a4ba17be5ec28
-
SHA1
8226aea9e79c7c82c96536c73db3a09869114230
-
SHA256
73a815655d2337bdf8990075d452ca008b38a0ab318a396ec9f3dc760f7c4d1d
-
SHA512
2b6a2bb52065de1f0c71046c854dbabe2f3b60cf34a06970f962d3359bdbade8eb2fcaf644516eda8d7932ea272c913c04d737cd375a85cd6bac1a7da79a56fd
-
SSDEEP
768:I02yvdzR7qsnAmJRXF425tF5PT95a8bOMhl3Ep:IgR2qAmJ1F42LFx95aGOM7m
Behavioral task
behavioral1
Sample
RealtekAudioDriverInstall.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
24.243.20.84:7000
Tw3DcWk3xR894OD7
-
Install_directory
%AppData%
-
install_file
Realtek Audio Driver.exe
Targets
-
-
Target
RealtekAudioDriverInstall.exe
-
Size
40KB
-
MD5
54a6f585c5d3483cb50a4ba17be5ec28
-
SHA1
8226aea9e79c7c82c96536c73db3a09869114230
-
SHA256
73a815655d2337bdf8990075d452ca008b38a0ab318a396ec9f3dc760f7c4d1d
-
SHA512
2b6a2bb52065de1f0c71046c854dbabe2f3b60cf34a06970f962d3359bdbade8eb2fcaf644516eda8d7932ea272c913c04d737cd375a85cd6bac1a7da79a56fd
-
SSDEEP
768:I02yvdzR7qsnAmJRXF425tF5PT95a8bOMhl3Ep:IgR2qAmJ1F42LFx95aGOM7m
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-