Analysis
-
max time kernel
4s -
max time network
7s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/03/2025, 21:01
General
-
Target
WobblyLife.exe
-
Size
44KB
-
MD5
4ee1c154fbae8e8f36662009a6a408e8
-
SHA1
bf769f24197e950c7ec9b4d1167ef2d87ff6e08a
-
SHA256
3222a4d6c5d76cd1f41332cf9804ab2ba4c8ae24205e1a724a56d24501409cd0
-
SHA512
61be6e5e179702206375574ba53d856bc6262c340339e84d9a1810dc7c832bc2a0aaf08cb0391e9ac2946ace9c6df0deac5e04f9ed0a292d1d748b279c5e5581
-
SSDEEP
768:/O36H7BEIliviyzwmLI8SBVKSbFEPa9b976tOFhOzbKSx:/tBE9cmOBVrFd9p76tOFQXx
Malware Config
Extracted
Family
xworm
Version
5.0
C2
Javv-46764.portmap.host:46764
Mutex
l5kkGhZ0p1VdMVCI
Attributes
-
Install_directory
%AppData%
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3048-1-0x0000000000D10000-0x0000000000D22000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3048 WobblyLife.exe