General
-
Target
Item Specifications.exe
-
Size
1.3MB
-
Sample
241115-k7wvna1mgy
-
MD5
5e8c689ae7f342a2b2dcf76ad9f990d4
-
SHA1
dc659d8c8284c0ec2d5cd4b0c4dd3a250d481331
-
SHA256
b2e9b488e12360fc455512ddae99dba10dd455df423853875e89ac1ffbdd06be
-
SHA512
46bd683b51c45cc92d5b35c236d8e339ab808cd87465eebd7f1a96ccdb28f994e0048a185a46a68dfd106e6fdd6e46a75c85caea180c03ac20ca2e3e778e64c9
-
SSDEEP
12288:0kjmrocDPyNhuTsAGBDNMrRbeyBYidXG4LrXFb2N:0ZbPyNqsAwyFCreDJKN
Static task
static1
Behavioral task
behavioral1
Sample
Item Specifications.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
3.1
savelat19847.duckdns.org:7000
6FO7gyeQQmt4IGRZ
-
install_file
USB.exe
Targets
-
-
Target
Item Specifications.exe
-
Size
1.3MB
-
MD5
5e8c689ae7f342a2b2dcf76ad9f990d4
-
SHA1
dc659d8c8284c0ec2d5cd4b0c4dd3a250d481331
-
SHA256
b2e9b488e12360fc455512ddae99dba10dd455df423853875e89ac1ffbdd06be
-
SHA512
46bd683b51c45cc92d5b35c236d8e339ab808cd87465eebd7f1a96ccdb28f994e0048a185a46a68dfd106e6fdd6e46a75c85caea180c03ac20ca2e3e778e64c9
-
SSDEEP
12288:0kjmrocDPyNhuTsAGBDNMrRbeyBYidXG4LrXFb2N:0ZbPyNqsAwyFCreDJKN
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext
-