General
-
Target
initialize.exe
-
Size
77KB
-
Sample
250329-nlvl9atnw2
-
MD5
cf10bc29fa7cf0eecbc8b588e8e4b8a9
-
SHA1
14ff3efa93fb23044658072ee8ec0afc368653a3
-
SHA256
5f4886a8b8e573c2daede58c73bd4ed31bb2310902ba8c384197a8c6e9273dfe
-
SHA512
6ef226b5c2582e9980bfea977ef7adf40257f5a11aeacbfda71d682e182207f9e4cb7d95d6ff6e70b13811b238c8b8bc18aa114d33dc9ff49f274c50d0061f89
-
SSDEEP
1536:zQMYzTYBo8kvIVGbA/pqtkeI/ObHs9TyTWlYKN6Yx6OOE01I3:kMgEu8MIVgUpsbI/ObHCmTWeKoO3gQ
Malware Config
Extracted
xworm
developed-headline.gl.at.ply.gg:12171
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7233744522:AAF4C4kHsWhsji1M9XSwnhnp-8xmfNuBpLs/sendMessage?chat_id=5445326064
Extracted
http://activetools.live/data.bat
http://activetools.live/Host.vbs
Extracted
https://github.com/Ladyhaha06/Python/archive/refs/heads/main.zip
Extracted
xworm
5.0
15.235.130.195:7000
nIGrXTARcqqUL0y6
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7521511416:AAF9XlqNWPqzl6LkH7jQe-YyUvkLv_AVsQw
Extracted
gurcu
https://api.telegram.org/bot7521511416:AAF9XlqNWPqzl6LkH7jQe-YyUvkLv_AVsQw/sendMessage?chat_id=-4799055577
Targets
-
-
Target
initialize.exe
-
Size
77KB
-
MD5
cf10bc29fa7cf0eecbc8b588e8e4b8a9
-
SHA1
14ff3efa93fb23044658072ee8ec0afc368653a3
-
SHA256
5f4886a8b8e573c2daede58c73bd4ed31bb2310902ba8c384197a8c6e9273dfe
-
SHA512
6ef226b5c2582e9980bfea977ef7adf40257f5a11aeacbfda71d682e182207f9e4cb7d95d6ff6e70b13811b238c8b8bc18aa114d33dc9ff49f274c50d0061f89
-
SSDEEP
1536:zQMYzTYBo8kvIVGbA/pqtkeI/ObHs9TyTWlYKN6Yx6OOE01I3:kMgEu8MIVgUpsbI/ObHCmTWeKoO3gQ
-
Detect Xworm Payload
-
Gurcu family
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-