General
-
Target
2792-40-0x0000000001370000-0x00000000013D4000-memory.dmp
-
Size
400KB
-
Sample
231230-m65ghsgef8
-
MD5
b1e314a1f181a925a551d818cdbe03f0
-
SHA1
05bbdedc0e2837d1943dfdd0df5911d8238ddc16
-
SHA256
c72b0b15aaede13c73a8ea680303e4bfa7f22a1ba420a83c59702bc56cd5ff4d
-
SHA512
50be71c92ab1e150ff8b4e8eba16b93dd96a1ff46f46e1f99e7624fe6376ffd602a06ad400a9ded77daec778477a4f033d185bcd8e78fb4d61bc8cc05d2322c8
-
SSDEEP
3072:CS0WP4rKvs3PGvbDis7GF3iO0FrEcMR94jVEUbRRYcWD/j/JJ9eGwUWNxo+K98Pn:C/KE3Ovb/KF3cIUEUVRxK/LKG9kv/
Behavioral task
behavioral1
Sample
2792-40-0x0000000001370000-0x00000000013D4000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2792-40-0x0000000001370000-0x00000000013D4000-memory.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
xworm
3.1
-
Install_directory
%ProgramData%
-
install_file
SecurityHealthSystray.exe
-
telegram
https://api.telegram.org/bot5370417334:AAEZrEauqhTNZInhZ9_-SaapQJIi0hIvjJU
Targets
-
-
Target
2792-40-0x0000000001370000-0x00000000013D4000-memory.dmp
-
Size
400KB
-
MD5
b1e314a1f181a925a551d818cdbe03f0
-
SHA1
05bbdedc0e2837d1943dfdd0df5911d8238ddc16
-
SHA256
c72b0b15aaede13c73a8ea680303e4bfa7f22a1ba420a83c59702bc56cd5ff4d
-
SHA512
50be71c92ab1e150ff8b4e8eba16b93dd96a1ff46f46e1f99e7624fe6376ffd602a06ad400a9ded77daec778477a4f033d185bcd8e78fb4d61bc8cc05d2322c8
-
SSDEEP
3072:CS0WP4rKvs3PGvbDis7GF3iO0FrEcMR94jVEUbRRYcWD/j/JJ9eGwUWNxo+K98Pn:C/KE3Ovb/KF3cIUEUVRxK/LKG9kv/
Score1/10 -