General
-
Target
akt.exe
-
Size
1.7MB
-
Sample
241009-vt5whstgqb
-
MD5
d386565f65fd215007e08b79fad52eca
-
SHA1
79338a5a2a7b781fac4c622ac30d651773e6d87a
-
SHA256
29bbe985c19803a61c9ca715304fa8fc510cf5fc89e0795e66c49228c21db723
-
SHA512
af7bec33430431102717e9ac6330318cddb54bc917dae83ee803b5756e6d20ae1d88144e37305d9ae693b4eba22f620a6b6763b4d8876f6aa3c0c8d5cb1e5209
-
SSDEEP
49152:y2EYTb8atv1orq+pEiSDTj1VyvBaJ1yHdBvAnOx30KlhY33lSYHEz/N:PXbIrq4bvAn043UYH
Static task
static1
Behavioral task
behavioral1
Sample
akt.exe
Resource
win7-20240704-en
Malware Config
Extracted
https://kribyrisk.com/b/iyyeOkT.txt
Extracted
xworm
5.0
192.3.182.92:7006
Aoea1E8EjOSX7FRX
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7354302040:AAGtvn7bJzaK4r9WucDxDr6yGqWpSJhoF44
Targets
-
-
Target
akt.exe
-
Size
1.7MB
-
MD5
d386565f65fd215007e08b79fad52eca
-
SHA1
79338a5a2a7b781fac4c622ac30d651773e6d87a
-
SHA256
29bbe985c19803a61c9ca715304fa8fc510cf5fc89e0795e66c49228c21db723
-
SHA512
af7bec33430431102717e9ac6330318cddb54bc917dae83ee803b5756e6d20ae1d88144e37305d9ae693b4eba22f620a6b6763b4d8876f6aa3c0c8d5cb1e5209
-
SSDEEP
49152:y2EYTb8atv1orq+pEiSDTj1VyvBaJ1yHdBvAnOx30KlhY33lSYHEz/N:PXbIrq4bvAn043UYH
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Drops file in System32 directory
-