General
-
Target
RuhsatBelgesi12ACE575 FORDKUNGA.rar
-
Size
547KB
-
Sample
250124-nfkvvsxlan
-
MD5
7bca6bb94ae289df7f4e93af463f4baa
-
SHA1
919fbc6a305b54ae7d95179e5737dcfa7632fe13
-
SHA256
5de6fc51288473b4d652bc281af2bac6d8a5b3795d12d63fb8b50e08d5294ebb
-
SHA512
dad2d0b9c73060aa3e65a62e264c12430654754a0681119b816db705c25e6d385d0a55f97b3d0ea53edaf98701ddb338c64bf123243cb83d4a48dcb060711e68
-
SSDEEP
12288:xAiQsro08VCJ3hr0Duo1KdTZXltaaVGIq:x3roRVm3uDd1KzVGIq
Static task
static1
Malware Config
Extracted
http://45.32.153.7/filezilla/ftp/htp/xd/yk/zp/XClient.exe
Extracted
xworm
5.0
45.32.153.7:7005
127.0.0.1:7005
1BGj20FVtOyvp4A2
-
install_file
USB.exe
Targets
-
-
Target
RuhsatBelgesi12ACE575 FORDKUNGA.bat
-
Size
1KB
-
MD5
be7fa3571d22850513b226ec24eef667
-
SHA1
4329266e1030c80af32a87387aa08afa1982ca8b
-
SHA256
83ac2825a5a6f97df1268c60d014182ed4be1c0088de5a8b9527a68556354570
-
SHA512
34e46f4a7318e1dd24909d139dd1c76b2b31f4ce1bcb4ee4a6c692d0fcbe45cfdb1a487a16d1242a536c44aaf8f3656981a0026d143e71bf951270774a067b0f
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-