General
-
Target
b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2.exe
-
Size
831KB
-
Sample
241118-fvecmatrdk
-
MD5
7c34b697269a715d224025fce3300fb0
-
SHA1
429056652fdaef40ad87c8a58df36db93fb58cfd
-
SHA256
b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2
-
SHA512
6f6a6b23fa8779610c75eac5944e54586eeeadc4891cf3e5454c870c8aa865165a5e991b8973b01a88415ed2b6ca09ae787d2c62472c811a970754f05763b6ae
-
SSDEEP
768:o4JmoODtZ6xC8qSDQCcZnVJ9QhEHz0uEXOT:o4JmtOfqS0CiD9QhEHz0tk
Static task
static1
Behavioral task
behavioral1
Sample
b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
procedure.kro.kr:5155
Ll3GZBodOrXAw0Lx
-
install_file
USB.exe
Targets
-
-
Target
b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2.exe
-
Size
831KB
-
MD5
7c34b697269a715d224025fce3300fb0
-
SHA1
429056652fdaef40ad87c8a58df36db93fb58cfd
-
SHA256
b8c74b1b222c4e1a54c8154e3fdbd30ffd6a93cae1b61a6855b7e31f508187f2
-
SHA512
6f6a6b23fa8779610c75eac5944e54586eeeadc4891cf3e5454c870c8aa865165a5e991b8973b01a88415ed2b6ca09ae787d2c62472c811a970754f05763b6ae
-
SSDEEP
768:o4JmoODtZ6xC8qSDQCcZnVJ9QhEHz0uEXOT:o4JmtOfqS0CiD9QhEHz0tk
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-