General
-
Target
5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59.exe
-
Size
967KB
-
Sample
240630-bjc8za1ekc
-
MD5
437ab2592608e8c710d9165cff2bacae
-
SHA1
935c5fe81f335ec3132c79b9f8e1e21c242a235d
-
SHA256
5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59
-
SHA512
4b4b0720428d184b1f6628227ce739c4b9bbdf91ee381893f8bdc295b83a7952c9bf371ab8a96f09e269b62a0358967ce3354e82a7523b1be86df5dab8b8d900
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXMmHageJJaYFp2x5:Vh+ZkldoPK8YageJAYY
Static task
static1
Behavioral task
behavioral1
Sample
5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59.exe
Resource
win7-20240611-en
Malware Config
Extracted
xworm
127.0.0.1:2887
mynegatobenna.ddns.net:2887
-
install_file
USB.exe
Targets
-
-
Target
5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59.exe
-
Size
967KB
-
MD5
437ab2592608e8c710d9165cff2bacae
-
SHA1
935c5fe81f335ec3132c79b9f8e1e21c242a235d
-
SHA256
5d1c2ac36ca274835d9025eb9e3f7a113cf57509898e02cb9add7a97824cea59
-
SHA512
4b4b0720428d184b1f6628227ce739c4b9bbdf91ee381893f8bdc295b83a7952c9bf371ab8a96f09e269b62a0358967ce3354e82a7523b1be86df5dab8b8d900
-
SSDEEP
24576:SAHnh+eWsN3skA4RV1Hom2KXMmHageJJaYFp2x5:Vh+ZkldoPK8YageJAYY
-
Detect Xworm Payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-