General
-
Target
c8fbdd732dfadeb0eabde5a558ee010f.exe
-
Size
3.0MB
-
Sample
240421-xwgykshg58
-
MD5
c8fbdd732dfadeb0eabde5a558ee010f
-
SHA1
210e30063960380c3d8cd98e33dc5ddb174b8d11
-
SHA256
eb9813c264d7fa7b04eeeddbff3c011c23f279dab97bc072e4aeb021f1be6544
-
SHA512
e5ba44f512f29244f7d7704174a144600b5d978bacf7b2beae8b269892f52db706759e7de409237aa4dfb10d9434bbce46e48b581ce5ca9dbc42bce685d370c5
-
SSDEEP
12288:lY8PCpCfyF1PeDEAX3jekDqEUO8IrO69ZKY2z+UD8PCpCfyF1c:lo94EO3jekDpkz+Oi
Static task
static1
Behavioral task
behavioral1
Sample
c8fbdd732dfadeb0eabde5a558ee010f.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
trusted420.anondns.net:3133
fjAkaKzp18Z4mXSg
-
install_file
USB.exe
Targets
-
-
Target
c8fbdd732dfadeb0eabde5a558ee010f.exe
-
Size
3.0MB
-
MD5
c8fbdd732dfadeb0eabde5a558ee010f
-
SHA1
210e30063960380c3d8cd98e33dc5ddb174b8d11
-
SHA256
eb9813c264d7fa7b04eeeddbff3c011c23f279dab97bc072e4aeb021f1be6544
-
SHA512
e5ba44f512f29244f7d7704174a144600b5d978bacf7b2beae8b269892f52db706759e7de409237aa4dfb10d9434bbce46e48b581ce5ca9dbc42bce685d370c5
-
SSDEEP
12288:lY8PCpCfyF1PeDEAX3jekDqEUO8IrO69ZKY2z+UD8PCpCfyF1c:lo94EO3jekDpkz+Oi
-
Detect Xworm Payload
-
Suspicious use of SetThreadContext
-