General
-
Target
asdasdasdasda.exe
-
Size
48KB
-
Sample
250306-qv5jxszpx6
-
MD5
a60ecddeda18e71c641f0149c130cf21
-
SHA1
7a5763ef2685e13d74c92182fa6aa46fc9476064
-
SHA256
c33e509984c6cf412d6fe82792696e71dc30a467161eb3bdd457597cb8f61115
-
SHA512
8cdd2f5aaed5f8143f4e758cf8ad80ebef8963cbaf67b01c98b843426dfb9f37ae1d810a53d49b33b9d9f70df19389849d393e1d795d8471b64d8d79169d9d42
-
SSDEEP
768:q7wepLsTB5N5bXv4Gbql0Iv8B1tDPUeahJOLhG9X:q7bl2Bj1XAGbql0IUBYbOMB
Behavioral task
behavioral1
Sample
asdasdasdasda.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
asdasdasdasda.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
asdasdasdasda.exe
Resource
win11-20250217-en
Malware Config
Extracted
xworm
-
Install_directory
%port%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/92.221.112.199:80
Targets
-
-
Target
asdasdasdasda.exe
-
Size
48KB
-
MD5
a60ecddeda18e71c641f0149c130cf21
-
SHA1
7a5763ef2685e13d74c92182fa6aa46fc9476064
-
SHA256
c33e509984c6cf412d6fe82792696e71dc30a467161eb3bdd457597cb8f61115
-
SHA512
8cdd2f5aaed5f8143f4e758cf8ad80ebef8963cbaf67b01c98b843426dfb9f37ae1d810a53d49b33b9d9f70df19389849d393e1d795d8471b64d8d79169d9d42
-
SSDEEP
768:q7wepLsTB5N5bXv4Gbql0Iv8B1tDPUeahJOLhG9X:q7bl2Bj1XAGbql0IUBYbOMB
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-