General
-
Target
py.ps1
-
Size
3.0MB
-
Sample
240422-myzajaae7y
-
MD5
ac9dc593ee7a0648490fba31ab3a0f41
-
SHA1
dbd75036dff187bb000a843f48f890d6d0581162
-
SHA256
2b1f83d93f96ff93fd6f408b1ae52a9cc3d1fad917db88c887a07e039f7beaae
-
SHA512
55af405a0d328f536d7b88e14aa463fb45e11c929d085a3a7f99e6e26101078eb6bb6ba5e919ba3df3417c68400dbf7f3d08960f7987ad0d3c9d6667d5bd1544
-
SSDEEP
24576:5Vm+wL72rNiCumobcPioNJBrs54nSACpgjtI6l+UFwHA2/vU31SPKwJZC6nT+:j0Y
Static task
static1
Behavioral task
behavioral1
Sample
py.ps1
Resource
win7-20231129-en
Malware Config
Extracted
xworm
5.0
dcxwq1.duckdns.org:7000
KuxjcUwK7YR0UBzc
-
install_file
USB.exe
Targets
-
-
Target
py.ps1
-
Size
3.0MB
-
MD5
ac9dc593ee7a0648490fba31ab3a0f41
-
SHA1
dbd75036dff187bb000a843f48f890d6d0581162
-
SHA256
2b1f83d93f96ff93fd6f408b1ae52a9cc3d1fad917db88c887a07e039f7beaae
-
SHA512
55af405a0d328f536d7b88e14aa463fb45e11c929d085a3a7f99e6e26101078eb6bb6ba5e919ba3df3417c68400dbf7f3d08960f7987ad0d3c9d6667d5bd1544
-
SSDEEP
24576:5Vm+wL72rNiCumobcPioNJBrs54nSACpgjtI6l+UFwHA2/vU31SPKwJZC6nT+:j0Y
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-