General
-
Target
03122024_0023_ttpayment.img.iso
-
Size
1.5MB
-
Sample
241203-apgynszpht
-
MD5
b104d76fabd0b1729c74982ae190165a
-
SHA1
fc25173735b5eff67f00c29a59af8c3bee458148
-
SHA256
710eaf9862498e7ef2b2024783336c69bdb489ddc0b7028af6cc8510d19a733d
-
SHA512
ffff14804251f3869f24a9fea7687ad29ac909e286ef99c3f6649d54ad8b81736e8eca23059cd122d9ff76980500f7caabad1eee73634a28f0336072bf794997
-
SSDEEP
24576:Mu6J33O0c+JY5UZ+XC0kGso6FaP3pRbWY:Wu0c++OCvkGs9FavOY
Static task
static1
Behavioral task
behavioral1
Sample
newtt.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
newtt.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
newtt.pdf.exe
-
Size
972KB
-
MD5
0897304e5e056318413b793477142018
-
SHA1
09299856fae087ac29d25cea697d974858a77796
-
SHA256
8999a5fbe146e6183a2bffaae420236be218f3de96342e67642af88b2847b480
-
SHA512
90258358ec5bae8dc594b4521ecae40b17fd0e48749a6991eb0a461db1d47d4e415482ef911b3a15cfd96a4722a0441c3701dd40d4f805cd64dce9098fe8a8d9
-
SSDEEP
24576:cu6J33O0c+JY5UZ+XC0kGso6FaP3pRbWY:Gu0c++OCvkGs9FavOY
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-