General
-
Target
7c13325d6a8d39c109967a36405b46fe3161eca9e7b9abb3b79e877997ddfd25
-
Size
6.3MB
-
Sample
241114-dd1hestejj
-
MD5
4149a40b2d855ce0ab30df3750d3644c
-
SHA1
75a8cbfffc5721509cff1aec9d7ec129c4e59d0b
-
SHA256
7c13325d6a8d39c109967a36405b46fe3161eca9e7b9abb3b79e877997ddfd25
-
SHA512
be86514ebb0452e461215fb4b5d99772697406943d7f8787e5f007e0dc396c8dfc19737a9c28b084a7d0c1612ee587608ff8ccde3341ce5a169e2b358c5d5f13
-
SSDEEP
98304:lXTFjm3UAtTlMmsoWXCo0B4nDk1vmp28nnnYFpyy3xjtVqox:lXTFjm3TtTlMPoW4B95mpsdxGox
Static task
static1
Behavioral task
behavioral1
Sample
7c13325d6a8d39c109967a36405b46fe3161eca9e7b9abb3b79e877997ddfd25.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7c13325d6a8d39c109967a36405b46fe3161eca9e7b9abb3b79e877997ddfd25.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
87.120.116.179:1300
C33DN8qMtx58OdAb
-
install_file
USB.exe
Targets
-
-
Target
7c13325d6a8d39c109967a36405b46fe3161eca9e7b9abb3b79e877997ddfd25
-
Size
6.3MB
-
MD5
4149a40b2d855ce0ab30df3750d3644c
-
SHA1
75a8cbfffc5721509cff1aec9d7ec129c4e59d0b
-
SHA256
7c13325d6a8d39c109967a36405b46fe3161eca9e7b9abb3b79e877997ddfd25
-
SHA512
be86514ebb0452e461215fb4b5d99772697406943d7f8787e5f007e0dc396c8dfc19737a9c28b084a7d0c1612ee587608ff8ccde3341ce5a169e2b358c5d5f13
-
SSDEEP
98304:lXTFjm3UAtTlMmsoWXCo0B4nDk1vmp28nnnYFpyy3xjtVqox:lXTFjm3TtTlMPoW4B95mpsdxGox
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-