General
-
Target
20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6eN.exe
-
Size
37KB
-
Sample
250120-jam1tayldl
-
MD5
7019dd15694b94a720ae4c44f8295110
-
SHA1
8cd76d9947355abcef281ac4f9f431f5fd4eeb7a
-
SHA256
20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6e
-
SHA512
39f395db825c59de0f919c8a58767ad46899af3ed85408aa400dd642f1814c26a976446b0ef04bc9ada2ebb92e9580c4be02932643c5b1f0d355773392991cc5
-
SSDEEP
768:hsuO5qBw/s6y7pxnm9uCOITbCsay5Q9lu0OzXh3Oh2MBC:euuqu/shCu4bCsaJfpOLOBC
Static task
static1
Behavioral task
behavioral1
Sample
20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6eN.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
zmيLاIJK8اRبes0C9caكلEueلبbxkي
-
Install_directory
%Port%
-
install_file
MasonUSB.exe
-
telegram
https://api.telegram.org/bot7474113602:AAGqt9bHSTfEOJdVPdI2enh5mOP4yQm6bps/sendMessage?chat_id=7068745055
Targets
-
-
Target
20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6eN.exe
-
Size
37KB
-
MD5
7019dd15694b94a720ae4c44f8295110
-
SHA1
8cd76d9947355abcef281ac4f9f431f5fd4eeb7a
-
SHA256
20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6e
-
SHA512
39f395db825c59de0f919c8a58767ad46899af3ed85408aa400dd642f1814c26a976446b0ef04bc9ada2ebb92e9580c4be02932643c5b1f0d355773392991cc5
-
SSDEEP
768:hsuO5qBw/s6y7pxnm9uCOITbCsay5Q9lu0OzXh3Oh2MBC:euuqu/shCu4bCsaJfpOLOBC
-
Detect Xworm Payload
-
Xworm family
-
Legitimate hosting services abused for malware hosting/C2
-