General
-
Target
daae736c8f04197fdab7aca6a9d79492272b03b0b0fb7a9f844810c2737ad84d.exe
-
Size
1.0MB
-
Sample
241106-ebd23stkfx
-
MD5
468e18a1e46996a9e12aeac76580c6ed
-
SHA1
4529b55ad5c142e320ca8e0916b175c61f7e8a92
-
SHA256
daae736c8f04197fdab7aca6a9d79492272b03b0b0fb7a9f844810c2737ad84d
-
SHA512
bc6faa2a4bff36301c411896a6271c70c7eada5bfdffb7456440a0e499f6467c27532484c1dcb0e23a7c1aa43376fcea697d77315c1293840733c1ca763def85
-
SSDEEP
24576:wqDEvCTbMWu7rQYlBQcBiT6rprG8a374rnT9exfxOkl:wTvC/MTQYxsWR7a37YT9exfxh
Static task
static1
Behavioral task
behavioral1
Sample
daae736c8f04197fdab7aca6a9d79492272b03b0b0fb7a9f844810c2737ad84d.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
173.205.83.196:3210
jJqPmV7YRG8bldRA
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
daae736c8f04197fdab7aca6a9d79492272b03b0b0fb7a9f844810c2737ad84d.exe
-
Size
1.0MB
-
MD5
468e18a1e46996a9e12aeac76580c6ed
-
SHA1
4529b55ad5c142e320ca8e0916b175c61f7e8a92
-
SHA256
daae736c8f04197fdab7aca6a9d79492272b03b0b0fb7a9f844810c2737ad84d
-
SHA512
bc6faa2a4bff36301c411896a6271c70c7eada5bfdffb7456440a0e499f6467c27532484c1dcb0e23a7c1aa43376fcea697d77315c1293840733c1ca763def85
-
SSDEEP
24576:wqDEvCTbMWu7rQYlBQcBiT6rprG8a374rnT9exfxOkl:wTvC/MTQYxsWR7a37YT9exfxh
-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-