General
-
Target
NitroGen.exe
-
Size
244KB
-
Sample
241110-1d6qrsvhnn
-
MD5
ba199a53400605e0dddec76f0bbb5d4f
-
SHA1
81182bc28677dd07a8731d196244fb9643bde827
-
SHA256
f273e967b289bf3c275aae486b8a49918a136c332fce84986417aac2f65d3a6a
-
SHA512
578b6ac9bad24da3811239c8346e7d8fd33e2e3b1a322dddb829ce6336b5683421913f4dc8a12190d404ac8aa86129458b6ff3c24911a54986a485a61da815eb
-
SSDEEP
1536:Grae78zjORCDGwfdCSog01313Rys5gCqbReEi0j+Rf21D2k:+ahKyd2n31F53/EAM2k
Static task
static1
Behavioral task
behavioral1
Sample
NitroGen.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
pastebin_url
https://pastebin.com/raw/mDSLGN9q
-
telegram
https://api.telegram.org/bot7168105056:AAGVK3B7ZFupxq4PpmnBpxAQOwJ5CUp76ow/sendMessage?chat_id=1992635040
Targets
-
-
Target
NitroGen.exe
-
Size
244KB
-
MD5
ba199a53400605e0dddec76f0bbb5d4f
-
SHA1
81182bc28677dd07a8731d196244fb9643bde827
-
SHA256
f273e967b289bf3c275aae486b8a49918a136c332fce84986417aac2f65d3a6a
-
SHA512
578b6ac9bad24da3811239c8346e7d8fd33e2e3b1a322dddb829ce6336b5683421913f4dc8a12190d404ac8aa86129458b6ff3c24911a54986a485a61da815eb
-
SSDEEP
1536:Grae78zjORCDGwfdCSog01313Rys5gCqbReEi0j+Rf21D2k:+ahKyd2n31F53/EAM2k
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Adds Run key to start application
-