General
-
Target
6d04562cf9d1e0ee7b7c77af40e1e3299b6eba9375f35978d9776d94a9dae3d7.bat
-
Size
379KB
-
Sample
240531-bp1lfshf5t
-
MD5
03c6c2175f84ad54c989f0608d3cbb57
-
SHA1
9846d7aa4c639d038f428977dfe0eef7db8ac009
-
SHA256
6d04562cf9d1e0ee7b7c77af40e1e3299b6eba9375f35978d9776d94a9dae3d7
-
SHA512
45bc9713a632904216f5bfd3e5648542382bc5c3aa8fa5253eea9f04d6592ac0aabcffc02451261210835f4f4d57c1f4895b7d02be24dd5edffbdc5e5b5e13c8
-
SSDEEP
6144:xdlplCiywRsuBfq3Y3zzyMECoefagF68zh3IHstkjcGH9z2eRTbYXa8KZITbq:xrCiHWuBS3Y3zzyDCoefPQsy/qeF6KZl
Static task
static1
Behavioral task
behavioral1
Sample
6d04562cf9d1e0ee7b7c77af40e1e3299b6eba9375f35978d9776d94a9dae3d7.bat
Resource
win7-20240221-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7001
134.255.233.93:7001
5loUYH5mEGReJgAG
-
install_file
USB.exe
Targets
-
-
Target
6d04562cf9d1e0ee7b7c77af40e1e3299b6eba9375f35978d9776d94a9dae3d7.bat
-
Size
379KB
-
MD5
03c6c2175f84ad54c989f0608d3cbb57
-
SHA1
9846d7aa4c639d038f428977dfe0eef7db8ac009
-
SHA256
6d04562cf9d1e0ee7b7c77af40e1e3299b6eba9375f35978d9776d94a9dae3d7
-
SHA512
45bc9713a632904216f5bfd3e5648542382bc5c3aa8fa5253eea9f04d6592ac0aabcffc02451261210835f4f4d57c1f4895b7d02be24dd5edffbdc5e5b5e13c8
-
SSDEEP
6144:xdlplCiywRsuBfq3Y3zzyMECoefagF68zh3IHstkjcGH9z2eRTbYXa8KZITbq:xrCiHWuBS3Y3zzyDCoefPQsy/qeF6KZl
-
Detect Xworm Payload
-
StormKitty payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects executables referencing Windows vault credential objects. Observed in infostealers
-
Detects executables referencing credit card regular expressions
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-