General
-
Target
0a9c2a6b3f96a8679ef15f3e4f2b8df2b244e01c07b93c40a530b002e8ec12c4
-
Size
185KB
-
Sample
240808-2flztavemf
-
MD5
3cbb8c5b44708455c2557d83a3b84e49
-
SHA1
e9decb691788c81348c677d2965102b8ee3eaa41
-
SHA256
0a9c2a6b3f96a8679ef15f3e4f2b8df2b244e01c07b93c40a530b002e8ec12c4
-
SHA512
58c4ae77718a09437e4f8778f130eac3edd35ef74758d7a1428cb646db6a1b0b31b4894fdc60ce8ef9e1b3a9303ea5c35217b10d3dc8eada893119a4643affa8
-
SSDEEP
3072:OvGyYiSDnt125GWp1icKAArDZz4N9GhbkrNEk1BhFwTEwPI4:i4Ap0yN90QEyFw3
Static task
static1
Behavioral task
behavioral1
Sample
0a9c2a6b3f96a8679ef15f3e4f2b8df2b244e01c07b93c40a530b002e8ec12c4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a9c2a6b3f96a8679ef15f3e4f2b8df2b244e01c07b93c40a530b002e8ec12c4.exe
Resource
win10-20240404-en
Malware Config
Extracted
xworm
5.0
94.156.65.22:6969
6cUhJv5oytobQBBE
-
install_file
USB.exe
Targets
-
-
Target
0a9c2a6b3f96a8679ef15f3e4f2b8df2b244e01c07b93c40a530b002e8ec12c4
-
Size
185KB
-
MD5
3cbb8c5b44708455c2557d83a3b84e49
-
SHA1
e9decb691788c81348c677d2965102b8ee3eaa41
-
SHA256
0a9c2a6b3f96a8679ef15f3e4f2b8df2b244e01c07b93c40a530b002e8ec12c4
-
SHA512
58c4ae77718a09437e4f8778f130eac3edd35ef74758d7a1428cb646db6a1b0b31b4894fdc60ce8ef9e1b3a9303ea5c35217b10d3dc8eada893119a4643affa8
-
SSDEEP
3072:OvGyYiSDnt125GWp1icKAArDZz4N9GhbkrNEk1BhFwTEwPI4:i4Ap0yN90QEyFw3
Score10/10-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Adds Run key to start application
-