General
-
Target
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470
-
Size
50KB
-
Sample
240419-fvfkpaaf8y
-
MD5
fe7c4b36fca4fdf53789979a4a09c880
-
SHA1
89caf7f3b9f4d7d732ade5593e1958f6f025afa1
-
SHA256
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470
-
SHA512
e0668f6dfda991ab07870d53ce291f73d48533c44dfed1178c8b98b57c799eb77f19451bc70d09caaf757bf18ef6217b44e7fc626b38c89261dc8920796339f3
-
SSDEEP
768:mDrJUAkwf3ppZuBdrm+KiPxWEh9HgPxWEjj4G:8rkwf3ppZRsPxZgPx94G
Static task
static1
Behavioral task
behavioral1
Sample
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470.exe
Resource
win11-20240412-en
Malware Config
Extracted
xworm
3.1
gamemodz.duckdns.org:6969
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470
-
Size
50KB
-
MD5
fe7c4b36fca4fdf53789979a4a09c880
-
SHA1
89caf7f3b9f4d7d732ade5593e1958f6f025afa1
-
SHA256
1b3711717d430ce33222b97fe8ec692741b7ac8bd9bfb4c2c975ae2f46b37470
-
SHA512
e0668f6dfda991ab07870d53ce291f73d48533c44dfed1178c8b98b57c799eb77f19451bc70d09caaf757bf18ef6217b44e7fc626b38c89261dc8920796339f3
-
SSDEEP
768:mDrJUAkwf3ppZuBdrm+KiPxWEh9HgPxWEjj4G:8rkwf3ppZRsPxZgPx94G
-
Chaos Ransomware
-
Detect Xworm Payload
-
Detect ZGRat V1
-
HermeticWiper
HermeticWiper is a partition-corrupting malware used in cyberattacks against Ukrainian organizations.
-
Drops file in Drivers directory
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-