General
-
Target
final.exe
-
Size
35KB
-
Sample
240403-d83w2afc82
-
MD5
36e7985a6c7c83dc5be87f812eac7978
-
SHA1
0d0bc113aa573353e5ea75b64456c350b306347d
-
SHA256
f8aac5c96fff1592b10d718f586d0bdd7f6e3039d6fdf6a20cae7fe9ac075e82
-
SHA512
51ac039f31b1cf22066e9b577875a7ecb4ddd6e5e8ecbd2ec1f4ee6dcf48b98c6449043ce92e94902d049041b7e2e997e1b4f97645753596fdf4f1a9290fe532
-
SSDEEP
384:7vg9j00WbqxAMTayV5N+5maFZZL3CRpJm3/KNm0ns0VgtFMAmNLToZw/RZCvK9ID:kB4QBTOl3Ck3CNUVFQ92WOMhPuvl3
Behavioral task
behavioral1
Sample
final.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
3.1
marxrwonew9090.duckdns.org:9090
jAGA4ZotP9f5mS9c
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
final.exe
-
Size
35KB
-
MD5
36e7985a6c7c83dc5be87f812eac7978
-
SHA1
0d0bc113aa573353e5ea75b64456c350b306347d
-
SHA256
f8aac5c96fff1592b10d718f586d0bdd7f6e3039d6fdf6a20cae7fe9ac075e82
-
SHA512
51ac039f31b1cf22066e9b577875a7ecb4ddd6e5e8ecbd2ec1f4ee6dcf48b98c6449043ce92e94902d049041b7e2e997e1b4f97645753596fdf4f1a9290fe532
-
SSDEEP
384:7vg9j00WbqxAMTayV5N+5maFZZL3CRpJm3/KNm0ns0VgtFMAmNLToZw/RZCvK9ID:kB4QBTOl3Ck3CNUVFQ92WOMhPuvl3
-
Detect Xworm Payload
-
Drops startup file
-