Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 23:26
Behavioral task
behavioral1
Sample
triggerbot.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
triggerbot.exe
-
Size
66KB
-
MD5
3c29f913ec259219393ed6ed34095f7f
-
SHA1
a44d686af7756b548373525b3cb921c44d0b67b2
-
SHA256
e65c82b121ec90f36fc4193e8e7f850312107c441e8a2cfa4e6b844cb6462485
-
SHA512
3a3e5a676a0541b9d5697c5f6f7b71deadae1e9633ff919cfdf68f9288f4b5dfb91c38a6af0fbbe23aaab5d08e1b6f409bf33134390a54ca023c916f3d5ecf50
-
SSDEEP
1536:vFVqX0n8XtajJvNDbsPSKoZr66tFOgUu9x6:9Yq8XQBbsT0FO7j
Malware Config
Extracted
Family
xworm
Attributes
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/kU06s0Rk
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4560-1-0x00000000003E0000-0x00000000003F6000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4560 triggerbot.exe