Resubmissions
28-05-2024 17:38
240528-v7t16sde7z 10General
-
Target
2v6pTG
-
Size
500B
-
Sample
240528-v7t16sde7z
-
MD5
628907342bd222d29d8ee5a7af8474b9
-
SHA1
55aa19207183854c9eff6004675392db4cb743e4
-
SHA256
a637b82debf0e7c1b3167b921d7cb7386f80b399ae5c23e7fd342e3873977870
-
SHA512
8fbb7d78a21584cfbcb78ead273f120e85e54294eb42aa131f8245a4fdf28d6d3bfeb3fa47df3fdb3645d8c6c912eedcf95c8bfae341d7ad98b159afbae4d49f
Static task
static1
Behavioral task
behavioral1
Sample
2v6pTG.html
Resource
win7-20240221-en
Malware Config
Extracted
xworm
5.0
yXLtzgVbIXdYh5zs
-
install_file
USB.exe
-
pastebin_url
http://pastebin.com/raw/e2U0xTFK
Targets
-
-
Target
2v6pTG
-
Size
500B
-
MD5
628907342bd222d29d8ee5a7af8474b9
-
SHA1
55aa19207183854c9eff6004675392db4cb743e4
-
SHA256
a637b82debf0e7c1b3167b921d7cb7386f80b399ae5c23e7fd342e3873977870
-
SHA512
8fbb7d78a21584cfbcb78ead273f120e85e54294eb42aa131f8245a4fdf28d6d3bfeb3fa47df3fdb3645d8c6c912eedcf95c8bfae341d7ad98b159afbae4d49f
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-