General
-
Target
4c8c129addb0befc1233bcf97b5f2ba5aa768cc529d3244c7fd452b9a599ed27
-
Size
10.3MB
-
Sample
241118-p57atswhnc
-
MD5
086ae059efcfa3719a91eb362ea7b0d3
-
SHA1
60701d200851fd9ebfdd8839683c0bc0dcd01050
-
SHA256
4c8c129addb0befc1233bcf97b5f2ba5aa768cc529d3244c7fd452b9a599ed27
-
SHA512
8cd3cbadef4b14ddf322bc718b1a9956ce3211fcd0765ba8ef2af4ca4465cdb7baa7afdaf9e47da13d1098c5e2d0118dad7b5b85c27fcc2d5e1070f50818cb3b
-
SSDEEP
196608:56nteHdgyFauFurL9pQQ9elLB9bRjc+TTAO8lw7NXCm9:ieHmENUelLTR5n8l+X9
Static task
static1
Behavioral task
behavioral1
Sample
4c8c129addb0befc1233bcf97b5f2ba5aa768cc529d3244c7fd452b9a599ed27.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c8c129addb0befc1233bcf97b5f2ba5aa768cc529d3244c7fd452b9a599ed27.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
147.124.219.98:7000
MRb1Mp9n6eyda5j3
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
4c8c129addb0befc1233bcf97b5f2ba5aa768cc529d3244c7fd452b9a599ed27
-
Size
10.3MB
-
MD5
086ae059efcfa3719a91eb362ea7b0d3
-
SHA1
60701d200851fd9ebfdd8839683c0bc0dcd01050
-
SHA256
4c8c129addb0befc1233bcf97b5f2ba5aa768cc529d3244c7fd452b9a599ed27
-
SHA512
8cd3cbadef4b14ddf322bc718b1a9956ce3211fcd0765ba8ef2af4ca4465cdb7baa7afdaf9e47da13d1098c5e2d0118dad7b5b85c27fcc2d5e1070f50818cb3b
-
SSDEEP
196608:56nteHdgyFauFurL9pQQ9elLB9bRjc+TTAO8lw7NXCm9:ieHmENUelLTR5n8l+X9
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-