General
-
Target
8.png
-
Size
179KB
-
Sample
241202-em9m5atqam
-
MD5
9ef75799925b2ac31fed9e659a16237c
-
SHA1
56229b949992062e82c97cb202c913a54f0f194d
-
SHA256
3bbdc10a48535df401713cbc1c29691a835258c8785fbcd58cf833398ddbd5e8
-
SHA512
dca70f1ae8d790aa3639b283be15b68af8cca79a4690b76e1d9868aa6adb00ad3e6feaf5bb6fc02592d9d56884798954b0a2ea5585b60a83f8552c7b1d07d3f7
-
SSDEEP
3072:saEodf9Bz5TOU6uCS+JAmqfvZLGH1yGAleW2rJOgEpTYA6nR6LT7Ofuih6WjayNJ:saEodf9uU6uCRJAmqfvZLGHIGAleW2rL
Static task
static1
Behavioral task
behavioral1
Sample
8.png
Resource
win7-20240903-en
Malware Config
Extracted
xworm
185.147.124.40:4404
-
install_file
USB.exe
Targets
-
-
Target
8.png
-
Size
179KB
-
MD5
9ef75799925b2ac31fed9e659a16237c
-
SHA1
56229b949992062e82c97cb202c913a54f0f194d
-
SHA256
3bbdc10a48535df401713cbc1c29691a835258c8785fbcd58cf833398ddbd5e8
-
SHA512
dca70f1ae8d790aa3639b283be15b68af8cca79a4690b76e1d9868aa6adb00ad3e6feaf5bb6fc02592d9d56884798954b0a2ea5585b60a83f8552c7b1d07d3f7
-
SSDEEP
3072:saEodf9Bz5TOU6uCS+JAmqfvZLGH1yGAleW2rJOgEpTYA6nR6LT7Ofuih6WjayNJ:saEodf9uU6uCRJAmqfvZLGHIGAleW2rL
-
Detect Xworm Payload
-
Xworm family
-
System Binary Proxy Execution: Verclsid
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
Suspicious use of SetThreadContext
-