General

  • Target

    2792-40-0x0000000001370000-0x00000000013D4000-memory.dmp

  • Size

    400KB

  • MD5

    b1e314a1f181a925a551d818cdbe03f0

  • SHA1

    05bbdedc0e2837d1943dfdd0df5911d8238ddc16

  • SHA256

    c72b0b15aaede13c73a8ea680303e4bfa7f22a1ba420a83c59702bc56cd5ff4d

  • SHA512

    50be71c92ab1e150ff8b4e8eba16b93dd96a1ff46f46e1f99e7624fe6376ffd602a06ad400a9ded77daec778477a4f033d185bcd8e78fb4d61bc8cc05d2322c8

  • SSDEEP

    3072:CS0WP4rKvs3PGvbDis7GF3iO0FrEcMR94jVEUbRRYcWD/j/JJ9eGwUWNxo+K98Pn:C/KE3Ovb/KF3cIUEUVRxK/LKG9kv/

Score
10/10

Malware Config

Extracted

Family

xworm

Version

3.1

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    SecurityHealthSystray.exe

  • telegram

    https://api.telegram.org/bot5370417334:AAEZrEauqhTNZInhZ9_-SaapQJIi0hIvjJU

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2792-40-0x0000000001370000-0x00000000013D4000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections