General
-
Target
rstxdhuj.exe
-
Size
963KB
-
Sample
240925-yh74aavajm
-
MD5
1ef39c8bc5799aa381fe093a1f2d532a
-
SHA1
57eabb02a7c43c9682988227dd470734cc75edb2
-
SHA256
0cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4
-
SHA512
13a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682
-
SSDEEP
24576:6MGVJ/Oap+Bh45LEwaV1QghDHm5GQTSmGg:6NJ/jpi5waVhjm5GQ2m7
Static task
static1
Behavioral task
behavioral1
Sample
rstxdhuj.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rstxdhuj.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
188.190.10.161:4444
TSXTkO0pNBdN2KNw
-
install_file
USB.exe
Targets
-
-
Target
rstxdhuj.exe
-
Size
963KB
-
MD5
1ef39c8bc5799aa381fe093a1f2d532a
-
SHA1
57eabb02a7c43c9682988227dd470734cc75edb2
-
SHA256
0cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4
-
SHA512
13a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682
-
SSDEEP
24576:6MGVJ/Oap+Bh45LEwaV1QghDHm5GQTSmGg:6NJ/jpi5waVhjm5GQ2m7
-
Detect Xworm Payload
-
StormKitty payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-