General
-
Target
PO2708392024.tar.gz
-
Size
684KB
-
Sample
240124-r75wwschhm
-
MD5
be80012d8d9670abdd37a8fc7b4ce5d6
-
SHA1
04b153189accd547541ac0289cc5abf8ebab0cdf
-
SHA256
854c488587898415edec266f09e3b2c0c98ab44e0b4e8fc262f76e7f4787c904
-
SHA512
d498bc2ed554e48724c37fd8eb300ff3d9894a2599738c3f8b92dc4ba5d3d30de2440adda2472424d4697a042507691704e4ff8d0f727a20fe08c4ee720b7a64
-
SSDEEP
12288:TPnGvxV8Y4U2NqaOZrf39et+hJnh+E+nw9/RPZ4kacR2BmqvCDP6+Co3WcehEZzL:yxSY4rqtJvQtgnxgwZlacRYmqvcPPYhQ
Static task
static1
Behavioral task
behavioral1
Sample
PO2708392024.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PO2708392024.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
xworm
3.1
193.161.193.99:24049
Fhc0AfR5IWfrpo3r
-
install_file
USB.exe
Targets
-
-
Target
PO2708392024.exe
-
Size
1.2MB
-
MD5
2fa5b7276859ed345c32dbc5fefb95c8
-
SHA1
5b9d8f2e453c2ecfc586029285aabfc729aab75a
-
SHA256
b4c90bc7e8cd41814c1e3ce937b7d2db7d1593aa6d0c1bba560cba2418a8cca9
-
SHA512
6758cbd0a325d6a0efc90788e02fc99a0fc95783134e1640f5d494d145672afceb70f62d1d490d5fde264cb510c62e423f3987abffc87edc4ab19732a42c42d9
-
SSDEEP
24576:YAHnh+eWsN3skA4RV1Hom2KXMmHa66baOr0mqxEPLe92sZKt5:fh+ZkldoPK8Ya66b30/xWegsm
-
Detect Xworm Payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-