General
-
Target
Steam.exe
-
Size
144KB
-
Sample
250308-m5pdxawkz9
-
MD5
a3614a8b3247b24de5c7ffc763dc1caf
-
SHA1
7e3f222bfb753f1ebf1e27569af7a24d42476b9b
-
SHA256
caf4f464d2b19597c8ea779b41599c211d122e74954cc7c03ee2387f616725d1
-
SHA512
203172dbc4f5d07ac850344dbe0085a61eb18a98dfc5985da19c740490807ebdfaebb1c7b71c78b10c04dc97daafb848333b822f6eab4f94fa4974d2dde42430
-
SSDEEP
3072:PmBMigkWAx9bNTz8KQOiOyuT9F/Zj7Iq+gJTefr:bi7WA/bx5QOuyRnh+g
Malware Config
Extracted
xworm
some-event.gl.at.ply.gg:1337
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Steam.exe
-
Size
144KB
-
MD5
a3614a8b3247b24de5c7ffc763dc1caf
-
SHA1
7e3f222bfb753f1ebf1e27569af7a24d42476b9b
-
SHA256
caf4f464d2b19597c8ea779b41599c211d122e74954cc7c03ee2387f616725d1
-
SHA512
203172dbc4f5d07ac850344dbe0085a61eb18a98dfc5985da19c740490807ebdfaebb1c7b71c78b10c04dc97daafb848333b822f6eab4f94fa4974d2dde42430
-
SSDEEP
3072:PmBMigkWAx9bNTz8KQOiOyuT9F/Zj7Iq+gJTefr:bi7WA/bx5QOuyRnh+g
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-