General
-
Target
fb4ce395283d4dcc0632cddf7ab374aff3e3a03e2871364ea419ddc8deecaad4.bat
-
Size
809B
-
Sample
250304-ee5dfazlx7
-
MD5
da0c105256eccbca5772fb173b5a313f
-
SHA1
db0583cd2282aec4f414763cf22d677ec7073f76
-
SHA256
fb4ce395283d4dcc0632cddf7ab374aff3e3a03e2871364ea419ddc8deecaad4
-
SHA512
ea2b97998c20ed28f874b83bd15fccfd82dc34a6655988d121c833e5c0352cb4d23c4be1312c0a6863d3629a7d8957de2560fc9be42dfe22c375f937ccee894d
Static task
static1
Behavioral task
behavioral1
Sample
fb4ce395283d4dcc0632cddf7ab374aff3e3a03e2871364ea419ddc8deecaad4.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fb4ce395283d4dcc0632cddf7ab374aff3e3a03e2871364ea419ddc8deecaad4.bat
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
5.0
137.184.74.73:5000
fEkivyZANGvej5MK
-
install_file
USB.exe
Targets
-
-
Target
fb4ce395283d4dcc0632cddf7ab374aff3e3a03e2871364ea419ddc8deecaad4.bat
-
Size
809B
-
MD5
da0c105256eccbca5772fb173b5a313f
-
SHA1
db0583cd2282aec4f414763cf22d677ec7073f76
-
SHA256
fb4ce395283d4dcc0632cddf7ab374aff3e3a03e2871364ea419ddc8deecaad4
-
SHA512
ea2b97998c20ed28f874b83bd15fccfd82dc34a6655988d121c833e5c0352cb4d23c4be1312c0a6863d3629a7d8957de2560fc9be42dfe22c375f937ccee894d
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-