General

  • Target

    LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip

  • Size

    535KB

  • MD5

    11e7644c95387c1860ce7e936c749f74

  • SHA1

    a483dfec45aa156c31e5600b88ef043f23fbaaf1

  • SHA256

    8641f88b89c9076ece3ee571baa4b3c93ba3ac3883e90fe5f894dc41e3b7bdc7

  • SHA512

    d9ffbf735346887b7c4922fa6fb5a2c08d73cd8874cca3c36211b87138134ae718ecb16d593e7ca9aceb634ae7655cf61b2fd1d255be5f3b9f580aa072aef0f5

  • SSDEEP

    12288:vogNRCQ0wbQDG8kjVy9KhxHu7G6h4AbKuZYWRApRs3Of/K:NNRKVkMUTHu7puWRas+HK

Score
10/10

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %Public%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/UWpQULMP

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • LzFE9kDPVuOiAHeAkCumoRWhFzAt55DFiHAEX8Z8.zip
    .zip
  • Ro-exec/Defender_Settings.vbs
    .vbs
  • Ro-exec/READ ME (ro-exec).txt
  • Ro-exec/dControl.ini
  • Ro-exec/defcon.exe
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • Ro-exec/ezdebug.png
    .png
  • Ro-exec/loader-upd.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections