General
-
Target
XWorm 5.6 Edition Cracked.zip
-
Size
25.0MB
-
Sample
240725-19a9qs1fnd
-
MD5
057ed425caddf56452590f6b40e72a61
-
SHA1
8ac1ff197432d8f04a08e421217de1ca1e44a0a0
-
SHA256
29abcda84ffb413c142ff8f3aad3986030464f3ca2c959670b49527e697d621d
-
SHA512
e8c718e7d2439d5daa03fa587c4db02d95c127e3e22c9a14ba135c64b0c39445fe401086df9520f5af5fd8b7ac11a6738e93334dae035d690e5d652f55b21ab6
-
SSDEEP
786432:LyC3Xp1FGO4HoHhuh4WmhYP0G+736cSfe5XXlN0:53Xp1FJ4SfbYP0/7Kc9XXlN0
Behavioral task
behavioral1
Sample
Xworm V5.6.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Xworm V5.6.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
K8gQNnuQfSaMvyLt
-
install_file
USB.exe
Targets
-
-
Target
Xworm V5.6.exe
-
Size
14.9MB
-
MD5
56ccb739926a725e78a7acf9af52c4bb
-
SHA1
5b01b90137871c3c8f0d04f510c4d56b23932cbc
-
SHA256
90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
-
SHA512
2fee662bc4a1a36ce7328b23f991fa4a383b628839e403d6eb6a9533084b17699a6c939509867a86e803aafef2f9def98fa9305b576dad754aa7f599920c19a1
-
SSDEEP
196608:P4/BAe1d4ihvy85JhhYc3BSL1kehn4inje:PuyIhhkRka4i
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
AgentTesla payload
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-