Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 06:40
Static task
static1
Behavioral task
behavioral1
Sample
2aa4395a2484f92aa13f0a364ee8e128395f2fb785e0ab6eeff868f023950b89.exe
Resource
win7-20240729-en
General
-
Target
2aa4395a2484f92aa13f0a364ee8e128395f2fb785e0ab6eeff868f023950b89.exe
-
Size
37KB
-
MD5
0bb3afaca80dc8d2656758dfca76c634
-
SHA1
4acce37705831c3b49f00ee3386ff4e62e32f0c9
-
SHA256
2aa4395a2484f92aa13f0a364ee8e128395f2fb785e0ab6eeff868f023950b89
-
SHA512
02c4c326bd976f1b5e9ed1f8c9ba3e32eda7c71c95b2c21f90cea1e45d8384b7f15f458be020883bf99cda879647348fb1421196001154153009f31dfd9671d7
-
SSDEEP
768:hsuO5qBw/s6y7pxnm9uCOITbCsay5Q9lu0OzXh3Oh2MBCA:euuqu/shCu4bCsaJfpOLOBCA
Malware Config
Extracted
xworm
zmيLاIJK8اRبes0C9caكلEueلبbxkي
-
Install_directory
%Port%
-
install_file
MasonUSB.exe
-
telegram
https://api.telegram.org/bot7474113602:AAGqt9bHSTfEOJdVPdI2enh5mOP4yQm6bps/sendMessage?chat_id=7068745055
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/3608-3-0x00000000030E0000-0x00000000030F0000-memory.dmp family_xworm -
Xworm family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3608 2aa4395a2484f92aa13f0a364ee8e128395f2fb785e0ab6eeff868f023950b89.exe