General
-
Target
f43b5b30fcef8c10473fd401e3f0ffaa.zip
-
Size
1.3MB
-
Sample
250121-vbvylatkbt
-
MD5
f43b5b30fcef8c10473fd401e3f0ffaa
-
SHA1
1d39b182f9e04a7768f8cd7f6b973b72f3af3f30
-
SHA256
431813aa35747973b7eff070eee566c7e5426421ef5b18211bd429b5a9c80be7
-
SHA512
7cad0d81649e79203fbc7d6c6c88f7baecd904b2eacbad4db17793c8cdb7813d1e70d5393baa4168ae3cdfd96f88896c9eaeafbcf629124fc52f473f7d82cbc6
-
SSDEEP
24576:3h0ifAGi4PpPMmsAPTW6wLlhpSeE38IaKI9yN8V1j9gR5vFnpn9Ok7W8lYG2d6p:R0xGi4K7j7pzSOKXN81jExFDjc6p
Static task
static1
Behavioral task
behavioral1
Sample
AMORTIZACIÓN BANCARIA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AMORTIZACIÓN BANCARIA.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
87.120.116.179:1300
zblponSmvy85yKpQ
-
install_file
USB.exe
Targets
-
-
Target
AMORTIZACIÓN BANCARIA.exe
-
Size
2.5MB
-
MD5
7360bb6297d84ae2464be5a28dbf66c9
-
SHA1
7be0c4b196d52f98687d585e3b3f39b3ae5d9cdb
-
SHA256
6ac528d67fa33fd955d13d6de332f68d924459e0c98ca9e1b2676258b1d63bfa
-
SHA512
0f08d4eb8a414d5abc6db20d02b458668574614b16a075c290590f40d074e3b995cae105fb0a4b013f29852d76e41b3cec75aed7f4b6fd8d5c5a49e0779b7842
-
SSDEEP
49152:p5zkILuBjGAldgwTWrkACPNtRfKPO3nKKtdpmYXRS4tlRz:rvLcSAbfTmkAC7RD3nTdprRlRz
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-