General
-
Target
743db9757f94a7f6f6e80e01ae725daff09b56397f3c60a423da44104fa56cea.bat
-
Size
64KB
-
Sample
250305-dfenqswxh1
-
MD5
85895b178c1ab401353c71c150f01950
-
SHA1
f23aa3e21be2026a20cde84aac495eedbbc8ba5f
-
SHA256
743db9757f94a7f6f6e80e01ae725daff09b56397f3c60a423da44104fa56cea
-
SHA512
a6e1f8404c245f42285a2dc668b36ce041f9df2641707a715257e1c42694bb57f86c3cd4ba554e3264b6aa6c8046f683fd350e9b9c65a31ed58924f972afe50b
-
SSDEEP
1536:MVpdfg39TAXKl/yi4830S1BZkbmEKUgXEXzICKUnFPyREf:u49Mal/Ln0S1QHf9yREf
Static task
static1
Behavioral task
behavioral1
Sample
743db9757f94a7f6f6e80e01ae725daff09b56397f3c60a423da44104fa56cea.bat
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
tripplebanks.duckdns.org:3399
Lgqsm4XWzB9LrFCO
-
install_file
USB.exe
Targets
-
-
Target
743db9757f94a7f6f6e80e01ae725daff09b56397f3c60a423da44104fa56cea.bat
-
Size
64KB
-
MD5
85895b178c1ab401353c71c150f01950
-
SHA1
f23aa3e21be2026a20cde84aac495eedbbc8ba5f
-
SHA256
743db9757f94a7f6f6e80e01ae725daff09b56397f3c60a423da44104fa56cea
-
SHA512
a6e1f8404c245f42285a2dc668b36ce041f9df2641707a715257e1c42694bb57f86c3cd4ba554e3264b6aa6c8046f683fd350e9b9c65a31ed58924f972afe50b
-
SSDEEP
1536:MVpdfg39TAXKl/yi4830S1BZkbmEKUgXEXzICKUnFPyREf:u49Mal/Ln0S1QHf9yREf
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-