General
-
Target
bqkriy6l.exe
-
Size
1.4MB
-
Sample
241110-sjw5hsygrn
-
MD5
72a6fe522fd7466bf2e2ac9daf40a806
-
SHA1
b0164b9dfee039798191de85a96db7ac54538d02
-
SHA256
771d0ba5b4f3b2d1c6d7a5ebe9b395e70e3d125540c28f1a0c1f80098c6775ce
-
SHA512
b938a438e14458120316581cb1883579a2ce7f835b52f4ab1cde33aa85febcad11f8a8b0a23fb9a8acafa774fe9cbd1c804a02fd8e6f5d8df60924c351f0126e
-
SSDEEP
24576:9lh9OZjjhYvYjQJABLaR5nyAMqIvGPSFyPHCA2c8UkHBSDzJ4u:fhwZjjhYvYTLaPy+IvG6FHAk8DzJ4u
Static task
static1
Behavioral task
behavioral1
Sample
bqkriy6l.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
38.180.203.11:1010
LE5ccvPhTtoUBuJ2
-
install_file
USB.exe
Targets
-
-
Target
bqkriy6l.exe
-
Size
1.4MB
-
MD5
72a6fe522fd7466bf2e2ac9daf40a806
-
SHA1
b0164b9dfee039798191de85a96db7ac54538d02
-
SHA256
771d0ba5b4f3b2d1c6d7a5ebe9b395e70e3d125540c28f1a0c1f80098c6775ce
-
SHA512
b938a438e14458120316581cb1883579a2ce7f835b52f4ab1cde33aa85febcad11f8a8b0a23fb9a8acafa774fe9cbd1c804a02fd8e6f5d8df60924c351f0126e
-
SSDEEP
24576:9lh9OZjjhYvYjQJABLaR5nyAMqIvGPSFyPHCA2c8UkHBSDzJ4u:fhwZjjhYvYTLaPy+IvG6FHAk8DzJ4u
-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Suspicious use of SetThreadContext
-