General
-
Target
Space Stealer Builder.exe
-
Size
6.9MB
-
Sample
240627-akc4xsvdkj
-
MD5
ec946a666792c5586cdbb9e9e458f0b7
-
SHA1
09f657bac7bc2e05076b8c3143a32dae54fadf09
-
SHA256
ed46cc48a406b547e9f91d216933b952a5ce41d14c7566e4e0d02513ec85c0d5
-
SHA512
90e076f66f0063ad667411b72c0cb8196370b04bef47ad0ed6b085e5a09923a5b641780bf4cd953667f9c6cc60c2fec547fa69bf6e41bd9477b62297db4feb67
-
SSDEEP
196608:bMk+ly26dW1qZSETMB/IvEWzRDIidKATfCCQ4HJkW+yfR:bM/QW124I11ldKArCukUR
Static task
static1
Malware Config
Extracted
asyncrat
Default
147.185.221.20:36797
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
xworm
phones-prevent.gl.at.ply.gg:44101
-
install_file
USB.exe
Targets
-
-
Target
Space Stealer Builder.exe
-
Size
6.9MB
-
MD5
ec946a666792c5586cdbb9e9e458f0b7
-
SHA1
09f657bac7bc2e05076b8c3143a32dae54fadf09
-
SHA256
ed46cc48a406b547e9f91d216933b952a5ce41d14c7566e4e0d02513ec85c0d5
-
SHA512
90e076f66f0063ad667411b72c0cb8196370b04bef47ad0ed6b085e5a09923a5b641780bf4cd953667f9c6cc60c2fec547fa69bf6e41bd9477b62297db4feb67
-
SSDEEP
196608:bMk+ly26dW1qZSETMB/IvEWzRDIidKATfCCQ4HJkW+yfR:bM/QW124I11ldKArCukUR
-
Detect Xworm Payload
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-