General
-
Target
bf0db9f8a4b7e43549f33370ad164a80N
-
Size
410KB
-
Sample
240913-nt92xazfmd
-
MD5
bf0db9f8a4b7e43549f33370ad164a80
-
SHA1
2f6890787daa9e850efe3adce81b1e010255f24f
-
SHA256
9300b65a9c2d88371155b26b649e95bc3b61da97a8a33b4399fbcb4ce0287e5e
-
SHA512
ee2220944b0fcae1c25ef1ea4c02b7aa84b13215fba4a69b22890bd5be25ffed476b0ec474b3886981890097d6e07818397f155c1b2b7b830ff5c621d8849581
-
SSDEEP
3072:7KYke2fEgIIp6nlr176ikG6ja/VBpJN73Wnm5kAixEK9:7p2sI+HkG6ja/z7N7SrW
Static task
static1
Behavioral task
behavioral1
Sample
bf0db9f8a4b7e43549f33370ad164a80N.exe
Resource
win7-20240704-en
Malware Config
Extracted
xworm
5.0
Rakibl-48126.portmap.io:48126
SzpZ7u4GezdS2k5V
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Targets
-
-
Target
bf0db9f8a4b7e43549f33370ad164a80N
-
Size
410KB
-
MD5
bf0db9f8a4b7e43549f33370ad164a80
-
SHA1
2f6890787daa9e850efe3adce81b1e010255f24f
-
SHA256
9300b65a9c2d88371155b26b649e95bc3b61da97a8a33b4399fbcb4ce0287e5e
-
SHA512
ee2220944b0fcae1c25ef1ea4c02b7aa84b13215fba4a69b22890bd5be25ffed476b0ec474b3886981890097d6e07818397f155c1b2b7b830ff5c621d8849581
-
SSDEEP
3072:7KYke2fEgIIp6nlr176ikG6ja/VBpJN73Wnm5kAixEK9:7p2sI+HkG6ja/z7N7SrW
-
Detect Xworm Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-