General
-
Target
2025-01-23_d3996214f88197fb442ae1f7da0f97a1_avoslocker_luca-stealer
-
Size
2.7MB
-
Sample
250123-f6p89svkdy
-
MD5
d3996214f88197fb442ae1f7da0f97a1
-
SHA1
763fdb9bf1ae9cba005c615daa37e296b532af38
-
SHA256
1f9a3add3893270c1528481e9f4495b3730fa200bfca5664cc443ab2844851cd
-
SHA512
3ae89356f4a4309ef2b4ae7fa8dca58e37d5f274bfd7d1af97d2eeecf069d9b8d003dac14512868c04f830ddfaa0683598cc0b27455fe4349b3b7e5e7a0a3cf6
-
SSDEEP
49152:HKKe1YeEAYOW1+M5A8PYxNv9BRvQT+svqiaiv:qKsW1+M5NPYLv93vYv
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-23_d3996214f88197fb442ae1f7da0f97a1_avoslocker_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-23_d3996214f88197fb442ae1f7da0f97a1_avoslocker_luca-stealer.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
85.31.47.24:1888
TexoB6dLilC3DNR6
-
install_file
USB.exe
Targets
-
-
Target
2025-01-23_d3996214f88197fb442ae1f7da0f97a1_avoslocker_luca-stealer
-
Size
2.7MB
-
MD5
d3996214f88197fb442ae1f7da0f97a1
-
SHA1
763fdb9bf1ae9cba005c615daa37e296b532af38
-
SHA256
1f9a3add3893270c1528481e9f4495b3730fa200bfca5664cc443ab2844851cd
-
SHA512
3ae89356f4a4309ef2b4ae7fa8dca58e37d5f274bfd7d1af97d2eeecf069d9b8d003dac14512868c04f830ddfaa0683598cc0b27455fe4349b3b7e5e7a0a3cf6
-
SSDEEP
49152:HKKe1YeEAYOW1+M5A8PYxNv9BRvQT+svqiaiv:qKsW1+M5NPYLv93vYv
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-