General
-
Target
45.png.ps1
-
Size
181KB
-
Sample
241031-ryn7saykav
-
MD5
cfa1a53f2c8fc430241785a8528876e8
-
SHA1
c4a3bba161e9feca68717b7e0d4c6728b95970b1
-
SHA256
d08928d078d1b2ded79a527727839a0b302088e9934327a93d977e8a830af436
-
SHA512
2b6748b66bc1be3376c8c788d3107d86993fd5fff2bc67776ab7e3a0e9d11deb4d59c7ce5d5bbc1815470b945a5c25773d780290009702cb4db978a4200739d8
-
SSDEEP
3072:G7ZBqVuu4Z/njbXCmqx65NqoYM8DPRB3seN4jo+m7EcSxLEWRbI/LHfykXhHIe2i:G7DqVuu4Z/njbXCmqx65NqoYM8DPRB3t
Static task
static1
Behavioral task
behavioral1
Sample
45.png.ps1
Resource
win7-20240903-en
Malware Config
Extracted
xworm
85.209.11.15:4404
-
install_file
USB.exe
Targets
-
-
Target
45.png.ps1
-
Size
181KB
-
MD5
cfa1a53f2c8fc430241785a8528876e8
-
SHA1
c4a3bba161e9feca68717b7e0d4c6728b95970b1
-
SHA256
d08928d078d1b2ded79a527727839a0b302088e9934327a93d977e8a830af436
-
SHA512
2b6748b66bc1be3376c8c788d3107d86993fd5fff2bc67776ab7e3a0e9d11deb4d59c7ce5d5bbc1815470b945a5c25773d780290009702cb4db978a4200739d8
-
SSDEEP
3072:G7ZBqVuu4Z/njbXCmqx65NqoYM8DPRB3seN4jo+m7EcSxLEWRbI/LHfykXhHIe2i:G7DqVuu4Z/njbXCmqx65NqoYM8DPRB3t
-
Detect Xworm Payload
-
Xworm family
-
Suspicious use of SetThreadContext
-