General
-
Target
xff.cmd
-
Size
55KB
-
Sample
240603-ncsfjace2w
-
MD5
23c88462d32d9ea10a2e1d8dc2c0761d
-
SHA1
c4b3e713eeb23905db0919ad42eca4c4e04594ba
-
SHA256
726b4c7268e3ac98dafe554aa3cf05e6ed6a185890ff717702b2e5c606cc64c1
-
SHA512
cbb8dcec750ec00737c47d5352f13843831dcda49a0bd8c83cad986b47e6353a7d242257e7e08278c153902bec499688d8e89d2f5c73f1d90812234066545f0f
-
SSDEEP
768:cgYYV4VeUd8SqTSn40DSEg5+VmcA1T++1/WQItIoQMrGvNAoaN/:cgkRqTaRSTNTCCdvNAoaN/
Static task
static1
Behavioral task
behavioral1
Sample
xff.cmd
Resource
win7-20240419-en
Malware Config
Extracted
xworm
3.1
nmds.duckdns.org:8895
O3B5rRVaa3oX74CD
-
install_file
USB.exe
Targets
-
-
Target
xff.cmd
-
Size
55KB
-
MD5
23c88462d32d9ea10a2e1d8dc2c0761d
-
SHA1
c4b3e713eeb23905db0919ad42eca4c4e04594ba
-
SHA256
726b4c7268e3ac98dafe554aa3cf05e6ed6a185890ff717702b2e5c606cc64c1
-
SHA512
cbb8dcec750ec00737c47d5352f13843831dcda49a0bd8c83cad986b47e6353a7d242257e7e08278c153902bec499688d8e89d2f5c73f1d90812234066545f0f
-
SSDEEP
768:cgYYV4VeUd8SqTSn40DSEg5+VmcA1T++1/WQItIoQMrGvNAoaN/:cgkRqTaRSTNTCCdvNAoaN/
-
Detect Xworm Payload
-
Blocklisted process makes network request
-