General
-
Target
SRTWARE Loader V3.exe
-
Size
1.0MB
-
Sample
250302-tz58ssyny2
-
MD5
ad5d4726b0307aac731ca80af721ce9c
-
SHA1
25b2c8026d5c61e0af3b6524a25fd24c314a9c11
-
SHA256
11cb607716d3e18afa73c4043c9ba692911063497aa914d75514e3f174378097
-
SHA512
a9d74477cfa175e532dafe940da68ad8cb2db7854c50b78a7a4b5dcf34cd983a60affce76b8da08f06b3ff5eeca38a0439b2aa31d6da8199735fa4071418b55f
-
SSDEEP
24576:c0Xgd58ynSporPDu6rqe4UrkVrg8AuSTmTviqmS:c0Xe8qxrPy6me/keTYiq
Static task
static1
Behavioral task
behavioral1
Sample
SRTWARE Loader V3.exe
Resource
win11-20250217-en
Malware Config
Targets
-
-
Target
SRTWARE Loader V3.exe
-
Size
1.0MB
-
MD5
ad5d4726b0307aac731ca80af721ce9c
-
SHA1
25b2c8026d5c61e0af3b6524a25fd24c314a9c11
-
SHA256
11cb607716d3e18afa73c4043c9ba692911063497aa914d75514e3f174378097
-
SHA512
a9d74477cfa175e532dafe940da68ad8cb2db7854c50b78a7a4b5dcf34cd983a60affce76b8da08f06b3ff5eeca38a0439b2aa31d6da8199735fa4071418b55f
-
SSDEEP
24576:c0Xgd58ynSporPDu6rqe4UrkVrg8AuSTmTviqmS:c0Xe8qxrPy6me/keTYiq
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1