General
-
Target
5da5be9222d4c2eea3c8488142967635.zip
-
Size
5KB
-
Sample
241203-apf2dawnbm
-
MD5
5da5be9222d4c2eea3c8488142967635
-
SHA1
81b969bb7b2c1977dc65c6876e7378f0a5878c98
-
SHA256
4029b281ff0ccee03091490a857956f6e71068ab4d60915ccef9c3e1cb4de4e3
-
SHA512
eaf2b2663dff52b398a2bed80a568acca8bcd45920d2452cbf6ad1ca8990600d0422bead5331029d133e08bb4eccd286013ce86d52e2cc3cca488080e815c4e0
-
SSDEEP
96:I1v27m1Z+HfytUNLs8CT4FQSFukRYSJNJ/uWHob49jGNG0QJog/uN:I1v27mrKRNP04kkd8XqL0QJog/U
Static task
static1
Behavioral task
behavioral1
Sample
RESUMEN TRANSACCIONAL NO 987657456798786765476890.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
87.120.116.179:1300
B48go7npq3kwDYCH
-
install_file
USB.exe
Targets
-
-
Target
RESUMEN TRANSACCIONAL NO 987657456798786765476890.bat
-
Size
47KB
-
MD5
65d8a93edb5aeb9fc34964dea9f98602
-
SHA1
76581dbf1984576d325e108c585cd7fbd0b09006
-
SHA256
8c47e2ff28df3de6fa35509c4c3be6069e1a99fedea3d6992f61c53d49b248a7
-
SHA512
9105a7e781eeea5db245a72b86606a2d681a9eefc0e23c1da3053ee1b61635320a5c1e1f53ca56296f5844cacc736de100cc65930c85ee4f07b8546225418b47
-
SSDEEP
768:aoc6FkLLiNhoc6FkLLiNIoc6FkLLiN9oc6FkLLiNRoc6FkLLiNPc1aa5oc6FkLLx:aopF4ONhopF4ONIopF4ON9opF4ONRop6
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-