General
-
Target
d03cdb6f745777a9b759cc7b348bfa131ff9228abfa7b468427025331c6cbeb6.cmd
-
Size
64KB
-
Sample
240524-p7lrxadh9w
-
MD5
fa0ef860ffb4c4c8785edbf41a09ed46
-
SHA1
58e4dddc140fd43397ec9ac7a837ffd119438b3f
-
SHA256
d03cdb6f745777a9b759cc7b348bfa131ff9228abfa7b468427025331c6cbeb6
-
SHA512
ad3acaca45746495ff2158d0736aab9b642a1c75ba8b40ea6250b78cd59fc081145278793d4a9874aada2bc37cc11d233151660219a5b5de3c5b64d08fe40bdc
-
SSDEEP
1536:f/X/G7+gF7PV7f4ENwLaDu83y9vt93hSqAf+3DUwL:f/X/lgFl4ENwLb83y9vtVjYwL
Static task
static1
Behavioral task
behavioral1
Sample
d03cdb6f745777a9b759cc7b348bfa131ff9228abfa7b468427025331c6cbeb6.cmd
Resource
win7-20240508-en
Malware Config
Extracted
xworm
3.1
nmds.duckdns.org:8895
O3B5rRVaa3oX74CD
-
install_file
USB.exe
Targets
-
-
Target
d03cdb6f745777a9b759cc7b348bfa131ff9228abfa7b468427025331c6cbeb6.cmd
-
Size
64KB
-
MD5
fa0ef860ffb4c4c8785edbf41a09ed46
-
SHA1
58e4dddc140fd43397ec9ac7a837ffd119438b3f
-
SHA256
d03cdb6f745777a9b759cc7b348bfa131ff9228abfa7b468427025331c6cbeb6
-
SHA512
ad3acaca45746495ff2158d0736aab9b642a1c75ba8b40ea6250b78cd59fc081145278793d4a9874aada2bc37cc11d233151660219a5b5de3c5b64d08fe40bdc
-
SSDEEP
1536:f/X/G7+gF7PV7f4ENwLaDu83y9vt93hSqAf+3DUwL:f/X/lgFl4ENwLb83y9vtVjYwL
-
Detect Xworm Payload
-
Blocklisted process makes network request
-