Analysis
-
max time kernel
44s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-01-2025 04:17
General
-
Target
rat.exe
-
Size
58KB
-
MD5
6c11c2d8d820ec31234facdfefe3a68b
-
SHA1
f1df0f86c9ff8724229ad285c36d7e68281a6e99
-
SHA256
5aa8c33941fb6fa703a24071c9edf9b8e988e5ae1b6621e29546cd238bda3775
-
SHA512
58d39a41a678d9024101a2b09375f510f5c312605673320564b46ed014a743abeba92095a78e80ad5c4ae4e7fc000a56e103e1db524dbdb3c3a3275435ab2f6e
-
SSDEEP
1536:ghxJkDcumJYw2kgLzEyc7nz+byYhqapL4V7O2TWWc:ggw2dSz+byubUxO2T7c
Malware Config
Extracted
Family
xworm
C2
127.0.0.1:7000
Attributes
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4308-1-0x0000000000A30000-0x0000000000A44000-memory.dmp family_xworm -
Xworm family
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4308 rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4308 rat.exe Token: SeDebugPrivilege 4308 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4308 rat.exe