General
-
Target
8344b15b9177b70916a48f8b8852747d6b7cb179e6d3edf5eac1692751b132fe
-
Size
187KB
-
Sample
241106-kcmcqswhra
-
MD5
087c075bc4fe5fe242b5c66c29869864
-
SHA1
c45efc31b2277d02383946a90394ca4db1f703af
-
SHA256
8344b15b9177b70916a48f8b8852747d6b7cb179e6d3edf5eac1692751b132fe
-
SHA512
ad424e56406d98047db617b7ef6df2da9cef765cb5bf4eb7e592045386c49a982d951778c04e33e9d978cf3740a4829bc1c695ca73c3abd64f3bc3e0f27b4119
-
SSDEEP
3072:TqWg0oaxBGieuvQTtv6c/mTRPyZqqiIdhI+czv/gJQE7zK+l+2aVbUucM5W65S:TgP8GiHvQTV+d/qi25eKfU2cbNcM5U
Static task
static1
Behavioral task
behavioral1
Sample
8344b15b9177b70916a48f8b8852747d6b7cb179e6d3edf5eac1692751b132fe.exe
Resource
win7-20240729-en
Malware Config
Extracted
xworm
5.0
45.149.241.37:7000
4zFlCBA2xyUliXRM
-
install_file
USB.exe
Targets
-
-
Target
8344b15b9177b70916a48f8b8852747d6b7cb179e6d3edf5eac1692751b132fe
-
Size
187KB
-
MD5
087c075bc4fe5fe242b5c66c29869864
-
SHA1
c45efc31b2277d02383946a90394ca4db1f703af
-
SHA256
8344b15b9177b70916a48f8b8852747d6b7cb179e6d3edf5eac1692751b132fe
-
SHA512
ad424e56406d98047db617b7ef6df2da9cef765cb5bf4eb7e592045386c49a982d951778c04e33e9d978cf3740a4829bc1c695ca73c3abd64f3bc3e0f27b4119
-
SSDEEP
3072:TqWg0oaxBGieuvQTtv6c/mTRPyZqqiIdhI+czv/gJQE7zK+l+2aVbUucM5W65S:TgP8GiHvQTV+d/qi25eKfU2cbNcM5U
-
Detect Xworm Payload
-
Xworm family
-
Suspicious use of SetThreadContext
-