General
-
Target
kam.cmd
-
Size
6KB
-
Sample
240523-t5tryshc6z
-
MD5
37b176c0abc29ec74dede88ced6e4cf1
-
SHA1
4aed169208162c12f26dfbe68e94e6781afcc47e
-
SHA256
7a5335537efdf7a6becc59c61912dd6b2b56ac7a2e9315b32a0dc3f8ac500fc5
-
SHA512
e8c36cf60ec4ac67dc60e30e8c60b58e12bd4ab522b8990faf038931bc5c93f41b144cc947847e23f09c163cf273f973d5162bf3f37b1c00f2ff7e19c54c5603
-
SSDEEP
192:qFS6GncJ3ovYJpHx+WHCNQWq/HncI1yiRj:qFS6Gq3AYJ/+AWqPncyX
Static task
static1
Behavioral task
behavioral1
Sample
kam.cmd
Resource
win7-20240508-en
Malware Config
Extracted
xworm
5.0
x5387400.duckdns.org:8896
F4ssR8b386Bj6q2g
-
install_file
USB.exe
Targets
-
-
Target
kam.cmd
-
Size
6KB
-
MD5
37b176c0abc29ec74dede88ced6e4cf1
-
SHA1
4aed169208162c12f26dfbe68e94e6781afcc47e
-
SHA256
7a5335537efdf7a6becc59c61912dd6b2b56ac7a2e9315b32a0dc3f8ac500fc5
-
SHA512
e8c36cf60ec4ac67dc60e30e8c60b58e12bd4ab522b8990faf038931bc5c93f41b144cc947847e23f09c163cf273f973d5162bf3f37b1c00f2ff7e19c54c5603
-
SSDEEP
192:qFS6GncJ3ovYJpHx+WHCNQWq/HncI1yiRj:qFS6Gq3AYJ/+AWqPncyX
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-