Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 13:17
Behavioral task
behavioral1
Sample
XWorm V5.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
XWorm V5.0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
XWorm V5.0.exe
Resource
win11-20240426-en
General
-
Target
XWorm V5.0.exe
-
Size
10.4MB
-
MD5
18d48ecc5c00fd8cefcfa05a66a56d36
-
SHA1
037c4f3694f1c6c9add0f0da60ecd2d24e75d85c
-
SHA256
41618dd526b6c3c8bb97a06c4875c342cd0e955194feea208261516f8c703a98
-
SHA512
135317987dcbfd4953317582ca19fb9275e90bfc4d717728acdc326a144c8a6834d55071b9ab701a5a7cf192339f9e010eb3534b0a6200fade9bb53f60a7fd48
-
SSDEEP
196608:z59nhcOWSxxgQHl2np1eY5J5itQaZWtU8i/MJ:zRRWQBQnpji1W+8i/
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3444-1-0x00000146B6AF0000-0x00000146B7562000-memory.dmp agile_net