General
-
Target
sp00ferv2.exe
-
Size
32KB
-
Sample
241101-xbzmwsslas
-
MD5
75714244c70d64941cd7e0f6d609afd8
-
SHA1
e478e0ea903af8e38b47a29f4023c50774d7830c
-
SHA256
810b933a5e1fb68b73f42193aae5565baf7194f970c4b773abb0b826bf6dd5a4
-
SHA512
ba0c153182b479255bf53f3707c05fda8b692bcc039c81093987b93f9a1ef47e25b5d7ce1ae7a19406878355f8fdcd76c38546ab68a3acb5a8d5740d36794a37
-
SSDEEP
768:QYZCbocfBfA84IcdHO7NwZFR9yCOjhU/9c:QYZCbvfBfARHduuFR9yCOjaVc
Behavioral task
behavioral1
Sample
sp00ferv2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.1
4.tcp.eu.ngrok.io:18635
aDVL0kX2ls16bX7K
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
sp00ferv2.exe
-
Size
32KB
-
MD5
75714244c70d64941cd7e0f6d609afd8
-
SHA1
e478e0ea903af8e38b47a29f4023c50774d7830c
-
SHA256
810b933a5e1fb68b73f42193aae5565baf7194f970c4b773abb0b826bf6dd5a4
-
SHA512
ba0c153182b479255bf53f3707c05fda8b692bcc039c81093987b93f9a1ef47e25b5d7ce1ae7a19406878355f8fdcd76c38546ab68a3acb5a8d5740d36794a37
-
SSDEEP
768:QYZCbocfBfA84IcdHO7NwZFR9yCOjhU/9c:QYZCbvfBfARHduuFR9yCOjaVc
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-