General
-
Target
Quotation.scr.exe
-
Size
699KB
-
Sample
241126-pxbtysxqfj
-
MD5
c684a63e08404601807c7bd5af233d28
-
SHA1
d9607463fcf1ce55eb8e5649b65047ee526d8060
-
SHA256
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621
-
SHA512
ffd030b446965e404fd7b76bf2839a9dd620b4c1ded7e82c6b02f277219514de0489059617bc2ca5b560c767b401630d0b2d34ec056df514771a563a8e0f46cd
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLxwxhzZ:ffmMv6Ckr7Mny5QLxwxhV
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.scr.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
3.1
69.174.99.6:7000
ZMMi52bfIGvYY0Ok
-
install_file
USB.exe
Targets
-
-
Target
Quotation.scr.exe
-
Size
699KB
-
MD5
c684a63e08404601807c7bd5af233d28
-
SHA1
d9607463fcf1ce55eb8e5649b65047ee526d8060
-
SHA256
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621
-
SHA512
ffd030b446965e404fd7b76bf2839a9dd620b4c1ded7e82c6b02f277219514de0489059617bc2ca5b560c767b401630d0b2d34ec056df514771a563a8e0f46cd
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLxwxhzZ:ffmMv6Ckr7Mny5QLxwxhV
-
Detect Xworm Payload
-
Xenarmor family
-
Xworm family
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1