General
-
Target
b.ps1
-
Size
181KB
-
Sample
250126-llhxcazjdn
-
MD5
b5008db49b4ac5e668451b9a34ce2b76
-
SHA1
820ebe8c35bf4c57e1e439e4b10cee8186c444d3
-
SHA256
7367d1b56aca0b585cef8466d8d9a83dac03f0e6d81f9e89567c10a2cc44a4bc
-
SHA512
43e8929ec5f728ee53f9a2b378f1949a789ac1e0a92fea559541444b39a3ca8da9911751bda6d37d30831f60af8b0356c4294b695de303cdd076c7c9b550c754
-
SSDEEP
3072:ZcUKZ20H5qt7ABLmYOlba6c5GdOa7MQrq3v0ayW3sfc4xDAmMz/zlZVdtj0QGTgn:ZcB20H5qt7ABLmYOlba6c5GdOa7MQrq/
Static task
static1
Behavioral task
behavioral1
Sample
b.ps1
Resource
win7-20240903-en
Malware Config
Extracted
xworm
176.113.115.228:4412
-
install_file
USB.exe
Targets
-
-
Target
b.ps1
-
Size
181KB
-
MD5
b5008db49b4ac5e668451b9a34ce2b76
-
SHA1
820ebe8c35bf4c57e1e439e4b10cee8186c444d3
-
SHA256
7367d1b56aca0b585cef8466d8d9a83dac03f0e6d81f9e89567c10a2cc44a4bc
-
SHA512
43e8929ec5f728ee53f9a2b378f1949a789ac1e0a92fea559541444b39a3ca8da9911751bda6d37d30831f60af8b0356c4294b695de303cdd076c7c9b550c754
-
SSDEEP
3072:ZcUKZ20H5qt7ABLmYOlba6c5GdOa7MQrq3v0ayW3sfc4xDAmMz/zlZVdtj0QGTgn:ZcB20H5qt7ABLmYOlba6c5GdOa7MQrq/
-
Detect Xworm Payload
-
Xworm family
-
Suspicious use of SetThreadContext
-