General
-
Target
prueba.ps1
-
Size
124B
-
Sample
241118-s5hh9avkdm
-
MD5
6542fcabb69f2e45e5abb6ef369d6b4b
-
SHA1
a9e758873a6c57d87b7e3bf02cfc04be6959d59b
-
SHA256
fd4dd13239fcd0e3171711951768b399b1b2210af3e6b4f7cc1c0a594bff7133
-
SHA512
6f9a75d4e17909c0dea87683bec1286964b8b21db927650c72db8b33df37b07a16b84bd56db42a5055e20c1895821b541467812dc03d5cefb4a144cebb2afb26
Static task
static1
Malware Config
Extracted
http://185.147.124.40/Capcha.html
Extracted
http://185.147.124.40/x/8.png
Extracted
xworm
185.147.124.40:4404
-
install_file
USB.exe
Targets
-
-
Target
prueba.ps1
-
Size
124B
-
MD5
6542fcabb69f2e45e5abb6ef369d6b4b
-
SHA1
a9e758873a6c57d87b7e3bf02cfc04be6959d59b
-
SHA256
fd4dd13239fcd0e3171711951768b399b1b2210af3e6b4f7cc1c0a594bff7133
-
SHA512
6f9a75d4e17909c0dea87683bec1286964b8b21db927650c72db8b33df37b07a16b84bd56db42a5055e20c1895821b541467812dc03d5cefb4a144cebb2afb26
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-