General
-
Target
Shipping_Documents.pdf_.bat
-
Size
64KB
-
Sample
250303-h5htxa1ry5
-
MD5
eac68a6120674bd90a20752d09d126e8
-
SHA1
9f73c48c6a5d177b67ca3f984caca601d6540427
-
SHA256
fbb07a7f02f9957564b487f7a893751f3059ae53dbcd0bdf5f176ca7be69096b
-
SHA512
f3240d2ecf309a5b1db1566b9fbff5ee7c946a26ff441327cbebb0ce1f3089e0a02934c14f164d59e934c585132413af38e4b6b389577eb61e1e7f590cb23248
-
SSDEEP
1536:vOYBZkbmEKUgXEXzICKUnF85J6ygoASfj3Hlbjeq5d6d01jK:vZQHfe5J6JQbn5dl1jK
Static task
static1
Behavioral task
behavioral1
Sample
Shipping_Documents.pdf_.bat
Resource
win7-20241023-en
Malware Config
Extracted
xworm
5.0
expresswealthz.duckdns.org:3911
RzkxMatWHp9NDD4H
-
install_file
USB.exe
Targets
-
-
Target
Shipping_Documents.pdf_.bat
-
Size
64KB
-
MD5
eac68a6120674bd90a20752d09d126e8
-
SHA1
9f73c48c6a5d177b67ca3f984caca601d6540427
-
SHA256
fbb07a7f02f9957564b487f7a893751f3059ae53dbcd0bdf5f176ca7be69096b
-
SHA512
f3240d2ecf309a5b1db1566b9fbff5ee7c946a26ff441327cbebb0ce1f3089e0a02934c14f164d59e934c585132413af38e4b6b389577eb61e1e7f590cb23248
-
SSDEEP
1536:vOYBZkbmEKUgXEXzICKUnF85J6ygoASfj3Hlbjeq5d6d01jK:vZQHfe5J6JQbn5dl1jK
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-