General
-
Target
cm-chat-media-video-1ed1d8e4b-814a-5abe-bf48-9183d87c3fae22700.mp4
-
Size
354KB
-
Sample
241019-gy24jatdlm
-
MD5
20e7c30e0ae7351db59ebea7e922a944
-
SHA1
3663755f85d76e11c8fd6e66945b5f2119b84c6d
-
SHA256
00bfd28fd4ac55a7fd87527842dc892cea858282d880640fe10f3c8cdc4e56ee
-
SHA512
efcfe5e10793ce9f77ef007c419ed3020417a0a69d642cfb7209d165e2d1afdab37cad183b6568f66edf80e270656f6559c3b8c255a58373b9ab37e88729971c
-
SSDEEP
6144:PLa4UVZw8TSp9OPNf1msHcaC3kR+wRj+yfMoZ5/Ny8qwXnMtKzU9bJpUPAPfUy:PHU4oSp4NtxHT+Wq8vNswX+9bvmAPfUy
Static task
static1
Malware Config
Extracted
xworm
join-ez.gl.at.ply.gg:27599
-
Install_directory
%AppData%
-
install_file
WindowsUpdate.exe
Targets
-
-
Target
cm-chat-media-video-1ed1d8e4b-814a-5abe-bf48-9183d87c3fae22700.mp4
-
Size
354KB
-
MD5
20e7c30e0ae7351db59ebea7e922a944
-
SHA1
3663755f85d76e11c8fd6e66945b5f2119b84c6d
-
SHA256
00bfd28fd4ac55a7fd87527842dc892cea858282d880640fe10f3c8cdc4e56ee
-
SHA512
efcfe5e10793ce9f77ef007c419ed3020417a0a69d642cfb7209d165e2d1afdab37cad183b6568f66edf80e270656f6559c3b8c255a58373b9ab37e88729971c
-
SSDEEP
6144:PLa4UVZw8TSp9OPNf1msHcaC3kR+wRj+yfMoZ5/Ny8qwXnMtKzU9bJpUPAPfUy:PHU4oSp4NtxHT+Wq8vNswX+9bvmAPfUy
-
Detect Xworm Payload
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-