General
-
Target
ccc270754c9759f623d9ec2f08ca17d960290e60f6c332f0682c9dc6c02d1141.ps1
-
Size
779B
-
Sample
250305-d96djsxxdx
-
MD5
209a0dcfb7e176365dc8f9a00dec716a
-
SHA1
aac44bda989e764f25277e7ed2b6680c781d704e
-
SHA256
ccc270754c9759f623d9ec2f08ca17d960290e60f6c332f0682c9dc6c02d1141
-
SHA512
354491ae39042832f2b419a85ffbb45e1159a35aa124cfb61c3ec47ba70da176f4bffe1a089f4dfa55ee3f76525cc6f1a204a84b153d44eb143ea6a6780f687b
Static task
static1
Behavioral task
behavioral1
Sample
ccc270754c9759f623d9ec2f08ca17d960290e60f6c332f0682c9dc6c02d1141.ps1
Resource
win7-20240903-en
Malware Config
Extracted
http://92.255.57.221/yr.exe
Extracted
xworm
5.0
92.255.57.221:4414
Targets
-
-
Target
ccc270754c9759f623d9ec2f08ca17d960290e60f6c332f0682c9dc6c02d1141.ps1
-
Size
779B
-
MD5
209a0dcfb7e176365dc8f9a00dec716a
-
SHA1
aac44bda989e764f25277e7ed2b6680c781d704e
-
SHA256
ccc270754c9759f623d9ec2f08ca17d960290e60f6c332f0682c9dc6c02d1141
-
SHA512
354491ae39042832f2b419a85ffbb45e1159a35aa124cfb61c3ec47ba70da176f4bffe1a089f4dfa55ee3f76525cc6f1a204a84b153d44eb143ea6a6780f687b
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-