General
-
Target
Account_Access_Alert_March05_2025_Report.lzh.rar
-
Size
36KB
-
Sample
250305-q3l3jszwby
-
MD5
2caded0dda6fb2e3eac9591ab15dcb6d
-
SHA1
57411055cc6f06c3e212ce77c7b19dea2a351003
-
SHA256
d49c722e1131ba0f485329ace558071e28b797672d2a80e98dd3c52afe36268e
-
SHA512
60dc15eb45af554c1698a084e317a2093355f17ff0adbc0c45df3bca4264aeb3ba341564e3b8026a1eaeb5e026a57e1cd9f355e26073a7e874120eab1af95121
-
SSDEEP
768:PRJQqiC29mKQqMXJCFd7a90W/im9JdKruYmBF5pnak/mO2d0:P4qZ2gKQqKmd71OnJ+u5BF5pak/PO0
Static task
static1
Behavioral task
behavioral1
Sample
Account_Access_Alert_March05_2025_Report.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
remnew25.duckdns.org:3984
XqNiNJ9BHQEGZDPh
-
install_file
USB.exe
Targets
-
-
Target
Account_Access_Alert_March05_2025_Report.bat
-
Size
66KB
-
MD5
884179d856f1870b50ee3b0ca606ca8a
-
SHA1
12f60d3393ac5e5c93637c168cc678b05aec183a
-
SHA256
02a9d861a3ca7c4b9096e16d74fad94c6b577b954e800f4b23625d133add5c6f
-
SHA512
ccac70be4a34a296010541496ada60763fcc460140956fb44d4051c84b2225109bb8fa68ee3d0ea4755d33ad39cba179883560bb7eae95b351dbc5204f39c50f
-
SSDEEP
1536:IjfS0G9/uMZf+dCwNsHbsFfKi2lkH0ZkbmEKUgXEXzICKUnFhGg:f9/uzdCwNs7wZ2GHZHfTGg
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-