General
-
Target
i4i5cWlPds5T4lU.exe
-
Size
2.4MB
-
Sample
250308-qvmn4sxqx4
-
MD5
6921656a8f1f24ab3b1a39c45b31ebc9
-
SHA1
54f97880caab512cac55201162b37a5e9d7f4ae6
-
SHA256
809e6e727c4ab324f36b55eebeaa3f0f77130c8bd2a0a11ec3c12e9e7a5345b8
-
SHA512
e251cfb31ff5ba0c224d22ffc13bc1f98872a450ec9fd404e064d6bf123d4378f8719130613f90a9609780fc28210cc7e8e1c32b9ab36e4a0142d36f7f70390a
-
SSDEEP
24576:d5/Jl2jvpMkjgWH7cFh3+Dg+Vj2G+92kNFycQZ1Pd/sZhnZaYxs12CG:67cP3+c+UN9H0lZ1tsXZje
Static task
static1
Behavioral task
behavioral1
Sample
i4i5cWlPds5T4lU.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
i4i5cWlPds5T4lU.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
MrN0name-63570.portmap.host:63570
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Targets
-
-
Target
i4i5cWlPds5T4lU.exe
-
Size
2.4MB
-
MD5
6921656a8f1f24ab3b1a39c45b31ebc9
-
SHA1
54f97880caab512cac55201162b37a5e9d7f4ae6
-
SHA256
809e6e727c4ab324f36b55eebeaa3f0f77130c8bd2a0a11ec3c12e9e7a5345b8
-
SHA512
e251cfb31ff5ba0c224d22ffc13bc1f98872a450ec9fd404e064d6bf123d4378f8719130613f90a9609780fc28210cc7e8e1c32b9ab36e4a0142d36f7f70390a
-
SSDEEP
24576:d5/Jl2jvpMkjgWH7cFh3+Dg+Vj2G+92kNFycQZ1Pd/sZhnZaYxs12CG:67cP3+c+UN9H0lZ1tsXZje
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-