Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 07:28
Static task
static1
Behavioral task
behavioral1
Sample
20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6eN.exe
Resource
win7-20241010-en
General
-
Target
20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6eN.exe
-
Size
37KB
-
MD5
7019dd15694b94a720ae4c44f8295110
-
SHA1
8cd76d9947355abcef281ac4f9f431f5fd4eeb7a
-
SHA256
20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6e
-
SHA512
39f395db825c59de0f919c8a58767ad46899af3ed85408aa400dd642f1814c26a976446b0ef04bc9ada2ebb92e9580c4be02932643c5b1f0d355773392991cc5
-
SSDEEP
768:hsuO5qBw/s6y7pxnm9uCOITbCsay5Q9lu0OzXh3Oh2MBC:euuqu/shCu4bCsaJfpOLOBC
Malware Config
Extracted
xworm
zmيLاIJK8اRبes0C9caكلEueلبbxkي
-
Install_directory
%Port%
-
install_file
MasonUSB.exe
-
telegram
https://api.telegram.org/bot7474113602:AAGqt9bHSTfEOJdVPdI2enh5mOP4yQm6bps/sendMessage?chat_id=7068745055
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4724-3-0x000000001B5E0000-0x000000001B5F0000-memory.dmp family_xworm -
Xworm family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 raw.githubusercontent.com 2 raw.githubusercontent.com 4 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4724 20e2b2ac52fece55bde1a09841b9942a15943df542f566273e4a370ce4b06b6eN.exe