Resubmissions

13-01-2025 01:05

250113-bfhdhs1jej 10

10-01-2025 13:47

250110-q3vdxsxrem 10

Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-01-2025 01:05

Errors

Reason
Payload did not run: payload error: fork/exec /tmp/XWorm.V7.2.zip: exec format error

General

  • Target

    XWorm.V7.2.zip

  • Size

    34.5MB

  • MD5

    9a678aadc9ed2e2bd69c4c3de72f9e69

  • SHA1

    742de1cae6423b50f59a9c757b016314f492f455

  • SHA256

    8a615f3ae908bbbfd33c6c019db5791372fd0bddae07681816ea43d12dd73bd9

  • SHA512

    8eb793302fa16fd155c465271288275e929cd4a63017b48925b57d73dfca889f7b36273aabbc3a08264a4eb6ea95899f61afe7a430c362d7cf22145787a70bd4

  • SSDEEP

    786432:2Aei7Z9K1koiZEj6mcaFf8G465XEDgjHOED+K6gWvPgbHGGg:eqSiFhuUJkhjHPOgbHG/

Score
3/10

Malware Config

Signatures

Processes

  • /tmp/XWorm.V7.2.zip
    /tmp/XWorm.V7.2.zip
    1⤵
    • System Network Configuration Discovery
    PID:665

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads