General
-
Target
news.bat
-
Size
18KB
-
Sample
240723-vnglqszgnr
-
MD5
0e66b4faedf4ff7af4616d075af9c48b
-
SHA1
0b0f1a69da674e980b3aefe8d6ae09cba654852a
-
SHA256
93b258cd1286d96f63a9aebb45102c179a7c8df203a295c4626a2a5a020ee24b
-
SHA512
dd2bb4ea44b773805ec277e2d28f3e9a82382067e59e429a83ce093fc33b68ea2299d89ffe5c26d6faa2ccab88d4aeb8345133a690db62d82e6db9955a62195e
-
SSDEEP
384:gTYcpQyuPmhDGEhtKCZLQD4vAUPUq+/cnodbc4uwXZwSTKB95B6jT9mr4QB:gTYcpQyuPmhDGEhtKCZZvhUq6vdbIw4R
Static task
static1
Behavioral task
behavioral1
Sample
news.bat
Resource
win7-20240705-en
Malware Config
Extracted
xworm
5.0
157.20.182.172:7000
iHRgIbaS0FTMce5d
-
install_file
USB.exe
Extracted
asyncrat
Default
45.66.231.150:3232
157.20.182.172:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
news.bat
-
Size
18KB
-
MD5
0e66b4faedf4ff7af4616d075af9c48b
-
SHA1
0b0f1a69da674e980b3aefe8d6ae09cba654852a
-
SHA256
93b258cd1286d96f63a9aebb45102c179a7c8df203a295c4626a2a5a020ee24b
-
SHA512
dd2bb4ea44b773805ec277e2d28f3e9a82382067e59e429a83ce093fc33b68ea2299d89ffe5c26d6faa2ccab88d4aeb8345133a690db62d82e6db9955a62195e
-
SSDEEP
384:gTYcpQyuPmhDGEhtKCZLQD4vAUPUq+/cnodbc4uwXZwSTKB95B6jT9mr4QB:gTYcpQyuPmhDGEhtKCZZvhUq6vdbIw4R
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-