General
-
Target
03032025_1237_Shipping_Documents.pdf_.bat.zip
-
Size
34KB
-
Sample
250303-pzsv9ax1ct
-
MD5
febc0f234ce35b1fd50f309af95b090b
-
SHA1
5f69c97fd53a282d1be8b97ae3fba266e9ab6b66
-
SHA256
4758b9130f78fd67643d92f9adde34516a5b757f20807edb7fbf6f3ee143f76e
-
SHA512
1a3d28fd174decce79970180092526871109d5fad2cad4103b15b75d206640b567fc5d2c5e5c295505ea27834d0b39dd6100d0e1ebd48b715163804b5a758b22
-
SSDEEP
768:H9J8WpQGIq9GjlP/qWs0GwOOYvg+UIHh6jjmNxsdT2+7JE/:dnpQGm3HGwivUIHQj86yGK
Static task
static1
Behavioral task
behavioral1
Sample
Shipping_Documents.pdf_.bat
Resource
win7-20240729-en
Malware Config
Extracted
xworm
5.0
expresswealthz.duckdns.org:3911
RzkxMatWHp9NDD4H
-
install_file
USB.exe
Targets
-
-
Target
Shipping_Documents.pdf_.bat
-
Size
64KB
-
MD5
eac68a6120674bd90a20752d09d126e8
-
SHA1
9f73c48c6a5d177b67ca3f984caca601d6540427
-
SHA256
fbb07a7f02f9957564b487f7a893751f3059ae53dbcd0bdf5f176ca7be69096b
-
SHA512
f3240d2ecf309a5b1db1566b9fbff5ee7c946a26ff441327cbebb0ce1f3089e0a02934c14f164d59e934c585132413af38e4b6b389577eb61e1e7f590cb23248
-
SSDEEP
1536:vOYBZkbmEKUgXEXzICKUnF85J6ygoASfj3Hlbjeq5d6d01jK:vZQHfe5J6JQbn5dl1jK
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-