General
-
Target
MonkerV1GuiTest.bat
-
Size
294KB
-
Sample
240522-qbet6acd9x
-
MD5
2b235c5e792b8c3dcbc4ccd0ccff02de
-
SHA1
6dd8fac6545df5f64bda4e746f3921d9a072bb59
-
SHA256
ebd66fd9265f312babcebc214c9e23433e0c0e88504c5859f034bdacffd54ddb
-
SHA512
cf61c50763cf8656bfb23250553052c1191179d30b50884f1cf8dcae64be48eae8dc43b9ccdb453e38e71bd4f5cfe94f8d44e86ba80552232eacdf23bac99e2f
-
SSDEEP
6144:6pA2upleIJqLKXd33GCpiMcOa+7seZEN3CbryZPhvAF8:6pAdpwoqa93GO2Oa+tON3CbGvf
Static task
static1
Behavioral task
behavioral1
Sample
MonkerV1GuiTest.bat
Resource
win10-20240404-en
Malware Config
Extracted
xworm
135.125.21.87:7000
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
MonkerV1GuiTest.bat
-
Size
294KB
-
MD5
2b235c5e792b8c3dcbc4ccd0ccff02de
-
SHA1
6dd8fac6545df5f64bda4e746f3921d9a072bb59
-
SHA256
ebd66fd9265f312babcebc214c9e23433e0c0e88504c5859f034bdacffd54ddb
-
SHA512
cf61c50763cf8656bfb23250553052c1191179d30b50884f1cf8dcae64be48eae8dc43b9ccdb453e38e71bd4f5cfe94f8d44e86ba80552232eacdf23bac99e2f
-
SSDEEP
6144:6pA2upleIJqLKXd33GCpiMcOa+7seZEN3CbryZPhvAF8:6pAdpwoqa93GO2Oa+tON3CbGvf
Score10/10-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-