General
-
Target
03072024164603072024OC13065.rar
-
Size
394KB
-
Sample
240703-wh6t4s1cjn
-
MD5
f661eb832779dd6625c1e7e0487e30ec
-
SHA1
48ca1c277bbfd5cf24af4093d3143b6a02b60e3b
-
SHA256
d4edd94a065d71ae37cb48c64a09e3dab0996096f8a98a378185b26816655e42
-
SHA512
54c8ad522c8df79c7dfe616734049969dbc27aedac6ea76a1c4e5e9d57159b8fed1860b0bc44491ac09e05f4e9db2d5046b8cfaab5011d7ec1cd1690b1478ba5
-
SSDEEP
12288:cHpjXQcEn18KJSowylLKPd39G2eP591uMdogqgmUyrX:aInCAU0Gl4H59EMdoqmP
Static task
static1
Behavioral task
behavioral1
Sample
OC 13065.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
OC 13065.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
xworm
5.0
185.29.11.111:7000
B3bYPcOfuxE4gqjQ
-
install_file
USB.exe
Targets
-
-
Target
OC 13065.exe
-
Size
1.8MB
-
MD5
26a81e6b9da7801ca3bd29c4b4d6b76c
-
SHA1
50e5cb8380bbc9f11f3b5bcd477c86f3b4ac6263
-
SHA256
f8850f3a39201ecea1e5bc30c07dad691e1b8db1a1eaeada7ed3d859e69a630e
-
SHA512
1a671f454bc48e108a831e9e1a2231a56cfcc0ee5c73c6f523d9764c75d256e32c070492a5d562250d64439422cd5658503afa00f69fc75e317e4193103854a8
-
SSDEEP
6144:Rx1iwfMPTymGeIHp58TY4adHganYLP3GAr0fSTSZlzOtvw9rI6HDCFixI+JAn3wk:b1Xd6T6qWArcSGZlgvw9rImCF+I93wk
Score10/10-
Detect Xworm Payload
-
StormKitty payload
-
Suspicious use of SetThreadContext
-