General
-
Target
bookmark.json
-
Size
1KB
-
Sample
241012-zvbfhsvgpn
-
MD5
31250fb90c32c3e1453c947715f7c711
-
SHA1
01d35f9b915574dc7898c378baa0259600138658
-
SHA256
007b4d5c9d30e5735d6e66276263ac160647f82ead368b1ac28e1d776b289948
-
SHA512
ce85530a216ef82669a517cda743947538675beafbb0594f75057d072b203f093845562244035930fa83294ad7868114ce46a3e9706234ad4764c2f10e24f257
Static task
static1
Behavioral task
behavioral1
Sample
bookmark.json
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
147.185.221.23:19182
0tac3AbqQOn4BTfX
-
install_file
USB.exe
Extracted
xworm
147.185.221.23:19182
-
install_file
USB.exe
Targets
-
-
Target
bookmark.json
-
Size
1KB
-
MD5
31250fb90c32c3e1453c947715f7c711
-
SHA1
01d35f9b915574dc7898c378baa0259600138658
-
SHA256
007b4d5c9d30e5735d6e66276263ac160647f82ead368b1ac28e1d776b289948
-
SHA512
ce85530a216ef82669a517cda743947538675beafbb0594f75057d072b203f093845562244035930fa83294ad7868114ce46a3e9706234ad4764c2f10e24f257
-
Detect Xworm Payload
-
StormKitty payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-