General
-
Target
77a2957f0b36feb1b71e9a7bb2d40d33.bin
-
Size
522KB
-
Sample
241106-bp9jcsvmep
-
MD5
8ff0c807bf457ce87bd2cbe88f30f10d
-
SHA1
26a41865d28d49005b83a4e0683b520be0e9a895
-
SHA256
0dad9afc978334839dd03bdcd93a9abeadfc53a0d285b80193c4e04e9552ca07
-
SHA512
37e6734bbdf7b3e9910b56d6887d8d604d70a3d9905d416b9c5dbf4e39e99081fbd57e7adf8b7f7facb000fb6504f44ee94b5e48efb7975656cbe2ab93643220
-
SSDEEP
12288:bS/kKa2ZvXwG0moZJc+3gxRp6n/HRSxpwyiZmmQE:b5sZIoorjwxiJk2yiZ31
Static task
static1
Behavioral task
behavioral1
Sample
17342376576faeacd5722d9f09635eea207de2343f4d81e67cb35bb08c18dc8c.exe
Resource
win7-20241023-en
Malware Config
Extracted
xworm
5.0
173.205.83.196:3210
jJqPmV7YRG8bldRA
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
17342376576faeacd5722d9f09635eea207de2343f4d81e67cb35bb08c18dc8c.exe
-
Size
965KB
-
MD5
77a2957f0b36feb1b71e9a7bb2d40d33
-
SHA1
272b5e1731b0e00ab84af461adae211297a35386
-
SHA256
17342376576faeacd5722d9f09635eea207de2343f4d81e67cb35bb08c18dc8c
-
SHA512
2ab5f17a2d2b6d1369cd410b5fe3cce7eb880313b1941012ea95cae55ed8be2c4bc7b7c9d1791dc4187fcd433b8b5a414842f8e8872ac195e88752875a6cfc4d
-
SSDEEP
12288:2hkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aI9AalvPpfK5I9H:mRmJkcoQricOIQxiZY1iaI9tlvJ8IZ
-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-