General
-
Target
steamtools.exe
-
Size
16.5MB
-
Sample
250308-kdt4zatrv8
-
MD5
97592018d4745ddb6f4881afbeaab229
-
SHA1
f72f7b9b3a17ca5df104196b13faa561f323d3c4
-
SHA256
213f8f74208577665d8eba6e082166a4f7c69bccf53439a78352262aff155856
-
SHA512
6f259dd64ecdf97dba0e0a581cc8b664e1fcc2d1c64e94b4654b83e6631264614f14f88857565f23e258e1fcb18590e0ac526e9b380fce88c65a0223b9fefd3d
-
SSDEEP
393216:wvQ37gGFSrT4XvbmLeLAOqNs2WxsDneQ4LUo7DGqCcKKn:wvkSrT4XvbyeLAO2LeQ54DzKC
Static task
static1
Behavioral task
behavioral1
Sample
steamtools.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
192.3.141.148:2020
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
steamtools.exe
-
Size
16.5MB
-
MD5
97592018d4745ddb6f4881afbeaab229
-
SHA1
f72f7b9b3a17ca5df104196b13faa561f323d3c4
-
SHA256
213f8f74208577665d8eba6e082166a4f7c69bccf53439a78352262aff155856
-
SHA512
6f259dd64ecdf97dba0e0a581cc8b664e1fcc2d1c64e94b4654b83e6631264614f14f88857565f23e258e1fcb18590e0ac526e9b380fce88c65a0223b9fefd3d
-
SSDEEP
393216:wvQ37gGFSrT4XvbmLeLAOqNs2WxsDneQ4LUo7DGqCcKKn:wvkSrT4XvbyeLAO2LeQ54DzKC
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-