General
-
Target
d1e97dd47e3903ba07de598a3048d1bffff8df29c47cbd852c958a4c210d677a.exe
-
Size
68KB
-
Sample
240509-l7fzwafb35
-
MD5
ac015ea331170ea31df4abc5461b51f4
-
SHA1
f31473ebcab052a6a632ce165fd7c717b8add5d4
-
SHA256
d1e97dd47e3903ba07de598a3048d1bffff8df29c47cbd852c958a4c210d677a
-
SHA512
e33d433df818f096d09b3f5337800a98fb2d88fd07d75a722edfe8b8d7cc57c599c3431fbf5809c718c802e60fd00fa2a2a46a1c41fe8b6a7e586a7b2c5aa615
-
SSDEEP
1536:y1gopCTSbwFnN/GGGw8RbXnnzo5d9Zb35LhlEDSUlJA7FAx:yISkFAq8Rbnnzo5d9Zb35LhlEDSUlJA
Behavioral task
behavioral1
Sample
d1e97dd47e3903ba07de598a3048d1bffff8df29c47cbd852c958a4c210d677a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d1e97dd47e3903ba07de598a3048d1bffff8df29c47cbd852c958a4c210d677a.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
5.0
193.161.193.99:40303
DRVHzSADfqFLqC90
-
install_file
USB.exe
Targets
-
-
Target
d1e97dd47e3903ba07de598a3048d1bffff8df29c47cbd852c958a4c210d677a.exe
-
Size
68KB
-
MD5
ac015ea331170ea31df4abc5461b51f4
-
SHA1
f31473ebcab052a6a632ce165fd7c717b8add5d4
-
SHA256
d1e97dd47e3903ba07de598a3048d1bffff8df29c47cbd852c958a4c210d677a
-
SHA512
e33d433df818f096d09b3f5337800a98fb2d88fd07d75a722edfe8b8d7cc57c599c3431fbf5809c718c802e60fd00fa2a2a46a1c41fe8b6a7e586a7b2c5aa615
-
SSDEEP
1536:y1gopCTSbwFnN/GGGw8RbXnnzo5d9Zb35LhlEDSUlJA7FAx:yISkFAq8Rbnnzo5d9Zb35LhlEDSUlJA
-
Detect Xworm Payload
-
Detect ZGRat V1
-
PureLog Stealer payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-