General
-
Target
castle.schematic
-
Size
337B
-
Sample
241203-t555zsyqfp
-
MD5
fa2698c00eafba8de01b887a8fdf44eb
-
SHA1
cd2595cbfec9e3d096d0db191ed4769d8b830497
-
SHA256
0f278718311cb0b48b2823ebf1148dcd904f6c31f70b73dc5ae6e26e2341b156
-
SHA512
81ed86476f45798531610cf2f4c70b1cb850a7ba8a63eb1a67e437e173ab6b68b369e7ef8b5508dca40b48d47a6e4e4ec3c0e062b46d540f06739e54e0825104
Static task
static1
Behavioral task
behavioral1
Sample
castle.gz
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
castle.gz
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
xworm
5.0
glitchfoda.ddns.net:1234
52v4amqz5lLtQorX
-
install_file
USB.exe
Targets
-
-
Target
castle.schematic
-
Size
337B
-
MD5
fa2698c00eafba8de01b887a8fdf44eb
-
SHA1
cd2595cbfec9e3d096d0db191ed4769d8b830497
-
SHA256
0f278718311cb0b48b2823ebf1148dcd904f6c31f70b73dc5ae6e26e2341b156
-
SHA512
81ed86476f45798531610cf2f4c70b1cb850a7ba8a63eb1a67e437e173ab6b68b369e7ef8b5508dca40b48d47a6e4e4ec3c0e062b46d540f06739e54e0825104
-
Detect Xworm Payload
-
Xworm family
-
Downloads MZ/PE file
-
Executes dropped EXE
-