General
-
Target
03032025_1235_awb_post_dhl_delivery_documents_03_03_2025_0000000000.bat.zip
-
Size
34KB
-
Sample
250303-psfmcaxygs
-
MD5
cb9f9ab904b1596e3e93e75956b8d6c5
-
SHA1
b333734254577fa228294a2e62d0796cfd52dd1e
-
SHA256
b228c2b8531490ef11cf6641993b32cdb1b05c5d77638356ba1dd1908e76dfa1
-
SHA512
874386f3ac00e78e8682b1f6f9f5d3a8d96ac495e725b220659f896705e2dc979c7cb5a30f9412d4af0e00858c89b0283cc6c34ea86141cd81ad38110cec6d11
-
SSDEEP
768:jC9zj3rqcr+iOAqH9hAyfZyV5vuh5H5z7U0KMUK11tJNQ:4fqcrwAqHTb85Wh5HhU05T1tJS
Static task
static1
Behavioral task
behavioral1
Sample
awb_post_dhl_delivery_documents_03_03_2025_0000000000.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
tripplebanks.duckdns.org:3399
Lgqsm4XWzB9LrFCO
-
install_file
USB.exe
Targets
-
-
Target
awb_post_dhl_delivery_documents_03_03_2025_0000000000.bat
-
Size
64KB
-
MD5
c9e1c4149f24616a23b6849386c8a045
-
SHA1
5a37e61994c77777c7bb6953eed8d336ad67645c
-
SHA256
e2e4a15190051f6a87bb10eab12b12744580d7d69b56c2c38a278865f10c2921
-
SHA512
52b92498d60e90d4f86751c8a682c80aa2cbacfab808f0c85d289491c8754d6e16649c750cd6e79024ef7052fc11a968efc23e2ace86ebe3aa8dc04c44f957dc
-
SSDEEP
1536:FmZkbmEKUgXEXzICKUnFevg9GPlv4hULBsbVnHk/bGvSHe5BNR:F3Hf0IkqbtHk/bGg83R
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-