General
-
Target
ashbeel.png
-
Size
57KB
-
Sample
250118-y1v7fatpfq
-
MD5
6ab5859e0e8bb45cd9209171ec4bfae0
-
SHA1
4de391a13bbbf565f349e76fde8a27bc625dff1c
-
SHA256
e30b339b0089711199dd9462636626bc764fdc2df349bf1b89edb74cf24c7538
-
SHA512
1a28f7a24a4a92c5fae8d30f4d4e0786dcf6c59c30c04fdb968661c08ccdbff32b218870d69f22644e548524744036eab9d033f3ddfd5fbcc0eba338e579d554
-
SSDEEP
1536:MpNiPkCqOYlw3zdZHjsHOB+bQKB0m9Oiklm:ASZ3BZDsS+bQq9Oik4
Behavioral task
behavioral1
Sample
ashbeel.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
poker-dosage.gl.at.ply.gg:10021
-
Install_directory
%AppData%
-
install_file
RealtekUService86.exe
Targets
-
-
Target
ashbeel.png
-
Size
57KB
-
MD5
6ab5859e0e8bb45cd9209171ec4bfae0
-
SHA1
4de391a13bbbf565f349e76fde8a27bc625dff1c
-
SHA256
e30b339b0089711199dd9462636626bc764fdc2df349bf1b89edb74cf24c7538
-
SHA512
1a28f7a24a4a92c5fae8d30f4d4e0786dcf6c59c30c04fdb968661c08ccdbff32b218870d69f22644e548524744036eab9d033f3ddfd5fbcc0eba338e579d554
-
SSDEEP
1536:MpNiPkCqOYlw3zdZHjsHOB+bQKB0m9Oiklm:ASZ3BZDsS+bQq9Oik4
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-