General
-
Target
88934a2051ecc62af7d1c383c7c30876.zip
-
Size
6KB
-
Sample
241203-arm8gazqfy
-
MD5
88934a2051ecc62af7d1c383c7c30876
-
SHA1
2402f7d25de4f99833d1be52d49b5071328f880e
-
SHA256
2784394efb434796b6764cd247ced2196ee0248e8fc8506b2a0bb94e657476ad
-
SHA512
706409afda169e1ae6347f37232b651d135bb905b834d55fbd1032e12793c2d97529c884e2d8f65159dbb5925de7688ea427b823236cd7b5c3773c404b3cb98b
-
SSDEEP
192:INnKbjNnKME8se1+gJCTved0eLbbLtJjaagChJ:IoB8Y5Dd0eLbb9g6
Static task
static1
Behavioral task
behavioral1
Sample
Transacción Aprobada - CUS 1084694334 diciembre 2 de 2024.bat
Resource
win7-20240708-en
Malware Config
Extracted
xworm
5.0
87.120.116.179:1300
B48go7npq3kwDYCH
-
install_file
USB.exe
Targets
-
-
Target
Transacción Aprobada - CUS 1084694334 diciembre 2 de 2024.bat
-
Size
47KB
-
MD5
65d8a93edb5aeb9fc34964dea9f98602
-
SHA1
76581dbf1984576d325e108c585cd7fbd0b09006
-
SHA256
8c47e2ff28df3de6fa35509c4c3be6069e1a99fedea3d6992f61c53d49b248a7
-
SHA512
9105a7e781eeea5db245a72b86606a2d681a9eefc0e23c1da3053ee1b61635320a5c1e1f53ca56296f5844cacc736de100cc65930c85ee4f07b8546225418b47
-
SSDEEP
768:aoc6FkLLiNhoc6FkLLiNIoc6FkLLiN9oc6FkLLiNRoc6FkLLiNPc1aa5oc6FkLLx:aopF4ONhopF4ONIopF4ON9opF4ONRop6
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-