General
-
Target
05112024_0048_04112024_Request for quotation.pdf.7z
-
Size
548KB
-
Sample
241105-a51qqazpcy
-
MD5
eb0caa7831a6bbe636f854fadb57a664
-
SHA1
fa4cc580f84cdc8341998e334fb66aea3abde6f0
-
SHA256
63563e6bfbb746f8aa33ff07896b76f75638373b7ba9a5af6bc2bea66241274c
-
SHA512
7f57ee2b30116d5a1bce0726f8afed91183c4370de2d4d3080e00ec23daa81536347163c770689a1d170415c7c6e6a7d4540086ef26184146f8a96a0b4762528
-
SSDEEP
12288:CC0MUrkxi1S/2mPrB/ybU6ovrYaQc+McdUHyg3bTtvgxLupOkeyl2F:F/UVC2arFGU6kEc+3USg3bTKxL6Ou2F
Static task
static1
Behavioral task
behavioral1
Sample
Request for quotation.pdf.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
195.154.49.246:2112
iTEfRI9nTI5flg7d
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
Request for quotation.pdf.exe
-
Size
1.1MB
-
MD5
5fbc756d04b68cd1c66a12a56628744f
-
SHA1
174afc1c59dd513d93afb9aa414e4a3486e8d7d2
-
SHA256
069facb5cf9660abced4bcb48a98ab7e5e51bb311517148ec794ff6ae4985652
-
SHA512
cb351a7675035f3e487a0d1deda13e4eb44ee74759e29d6cb4b43a990bc337afd15a5342ed543a5abb8324939ab707d347c43db7b140472529a57a9ac162b863
-
SSDEEP
24576:AAHnh+eWsN3skA4RV1Hom2KXFmIal9tlBu0OYACQ5:3h+ZkldoPK1Xal/juPP
-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-