General
-
Target
ae6f59d14ce7584e9dccf8e88f540fac601d92d35c6e6b0013f4e6682d08e7e5
-
Size
384KB
-
Sample
241107-aeklta1dja
-
MD5
5b24d055de2315fc815bdc4f771ecb26
-
SHA1
36f0b41d65b32827412ec4dd31e60081406ed4ac
-
SHA256
ae6f59d14ce7584e9dccf8e88f540fac601d92d35c6e6b0013f4e6682d08e7e5
-
SHA512
9c291b18df19dac2f0ff7cdcaaf6d6fd58e9e592d9690eef9ff257ccc7432f6f56f634641dc6ac9e3857e22ae26ea0f487c1d8090f53746a64d06a4e3c0492d2
-
SSDEEP
12288:2k6wOOlsur4fw+97KIyR2hCeS+FlPDkjWKUus:D6wD+RXhKIyR2EeTlPojlUP
Static task
static1
Behavioral task
behavioral1
Sample
ORDER DRAWING AND PHOTOS.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
weidmachane.zapto.org:7000
Y3sPpIW4xQztdVfl
-
install_file
USB.exe
Extracted
latentbot
weidmachane.zapto.org
Targets
-
-
Target
ORDER DRAWING AND PHOTOS.exe
-
Size
2.0MB
-
MD5
395bb950d2979e4c3911d90852c06345
-
SHA1
2a693150907af200bbf8582a69e663d23249c7d0
-
SHA256
1adbc19898a40ae7f2c6fd9a6d1c502c7152ba6b04d4584e2c7476606f9b24ff
-
SHA512
d95b46177b0820f286e99f647ff398788d24502885fc2b63fe19dfb1a58d7ae15cabd2749ab00b709b37a3fb75b9ccf28628ad2f686a507fc1142486a8f32b61
-
SSDEEP
12288:xkNH+OOlsur4fwML7K6yD210eS+Fl1DkjGKUuU6Sn:mH+D+Hb3K6yD22eTl1oj1UYq
-
Detect Xworm Payload
-
Latentbot family
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Suspicious use of SetThreadContext
-