General
-
Target
e2e4a15190051f6a87bb10eab12b12744580d7d69b56c2c38a278865f10c2921.bat
-
Size
64KB
-
Sample
250305-ehqpfsykv2
-
MD5
c9e1c4149f24616a23b6849386c8a045
-
SHA1
5a37e61994c77777c7bb6953eed8d336ad67645c
-
SHA256
e2e4a15190051f6a87bb10eab12b12744580d7d69b56c2c38a278865f10c2921
-
SHA512
52b92498d60e90d4f86751c8a682c80aa2cbacfab808f0c85d289491c8754d6e16649c750cd6e79024ef7052fc11a968efc23e2ace86ebe3aa8dc04c44f957dc
-
SSDEEP
1536:FmZkbmEKUgXEXzICKUnFevg9GPlv4hULBsbVnHk/bGvSHe5BNR:F3Hf0IkqbtHk/bGg83R
Static task
static1
Behavioral task
behavioral1
Sample
e2e4a15190051f6a87bb10eab12b12744580d7d69b56c2c38a278865f10c2921.bat
Resource
win7-20250207-en
Malware Config
Extracted
xworm
5.0
tripplebanks.duckdns.org:3399
Lgqsm4XWzB9LrFCO
-
install_file
USB.exe
Targets
-
-
Target
e2e4a15190051f6a87bb10eab12b12744580d7d69b56c2c38a278865f10c2921.bat
-
Size
64KB
-
MD5
c9e1c4149f24616a23b6849386c8a045
-
SHA1
5a37e61994c77777c7bb6953eed8d336ad67645c
-
SHA256
e2e4a15190051f6a87bb10eab12b12744580d7d69b56c2c38a278865f10c2921
-
SHA512
52b92498d60e90d4f86751c8a682c80aa2cbacfab808f0c85d289491c8754d6e16649c750cd6e79024ef7052fc11a968efc23e2ace86ebe3aa8dc04c44f957dc
-
SSDEEP
1536:FmZkbmEKUgXEXzICKUnFevg9GPlv4hULBsbVnHk/bGvSHe5BNR:F3Hf0IkqbtHk/bGg83R
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-