General
-
Target
download
-
Size
2KB
-
Sample
250123-12n6maxmcr
-
MD5
8c07f2e4c587ddb33c32e034fe17149c
-
SHA1
18e31d80138535b44b5715e75e52efb08ecb136f
-
SHA256
de9aa87bc82a074d5c5df9bea385442e878b2ecdfbb0c47c864fb19756a6f4e6
-
SHA512
320bee58ed20a737c34d03aee9c875efdfa7877c26e9da0daeec092721b0bc52406c08ebe308becc3534a75da869d9b0839cf93bb1aac8f698a0851ee0e774ba
Static task
static1
Behavioral task
behavioral1
Sample
download.html
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
87.120.116.179:1300
k2ajRGAWWdwZwgsE
-
install_file
USB.exe
Targets
-
-
Target
download
-
Size
2KB
-
MD5
8c07f2e4c587ddb33c32e034fe17149c
-
SHA1
18e31d80138535b44b5715e75e52efb08ecb136f
-
SHA256
de9aa87bc82a074d5c5df9bea385442e878b2ecdfbb0c47c864fb19756a6f4e6
-
SHA512
320bee58ed20a737c34d03aee9c875efdfa7877c26e9da0daeec092721b0bc52406c08ebe308becc3534a75da869d9b0839cf93bb1aac8f698a0851ee0e774ba
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-