General
-
Target
244db0aad5271d5d5ce245acb02c0856673f7dcefcccd65007b7fc604dcda570.zip
-
Size
378KB
-
Sample
241116-cpn34axjcy
-
MD5
c10b8c06b032dbf489a6f63522504201
-
SHA1
7920febefd80151a4193684d398f3e60865eca63
-
SHA256
244db0aad5271d5d5ce245acb02c0856673f7dcefcccd65007b7fc604dcda570
-
SHA512
867899262a6490450c41ae665212e031e5b8f93f37968fae0dde86792a2726989a0ea921b7914967770de772a9a9912cb94ece48127748658da577cb171ea7ee
-
SSDEEP
6144:Iz9C4mSg6p4lp2C+zcDNJyvhu12ysAk9ZwlWDVRuIqnbeWrBY3OdNTJm4JrXMCI5:E9xmFOcDnyvhuxsAkBDVArnbeMBYedX6
Static task
static1
Behavioral task
behavioral1
Sample
Item Specifications.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
3.1
savelat19847.duckdns.org:7000
6FO7gyeQQmt4IGRZ
-
install_file
USB.exe
Targets
-
-
Target
Item Specifications.exe
-
Size
1.3MB
-
MD5
5e8c689ae7f342a2b2dcf76ad9f990d4
-
SHA1
dc659d8c8284c0ec2d5cd4b0c4dd3a250d481331
-
SHA256
b2e9b488e12360fc455512ddae99dba10dd455df423853875e89ac1ffbdd06be
-
SHA512
46bd683b51c45cc92d5b35c236d8e339ab808cd87465eebd7f1a96ccdb28f994e0048a185a46a68dfd106e6fdd6e46a75c85caea180c03ac20ca2e3e778e64c9
-
SSDEEP
12288:0kjmrocDPyNhuTsAGBDNMrRbeyBYidXG4LrXFb2N:0ZbPyNqsAwyFCreDJKN
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext
-