General
-
Target
XClient_encrypted_obf_bat.bat
-
Size
540KB
-
Sample
250307-2hwxssyqv3
-
MD5
7691f0a3619e34794c2d9f8acd645e30
-
SHA1
666541b63a9f6b808765e45b1238a2935b3be7a8
-
SHA256
0c17eb3ab5d7fdff6fcde1fee32a4183ec0928aa7ae77a74b140a128ed671b84
-
SHA512
76750941a254405f4477f989315db2ba5507dc8a6bb6c1091b4f0510a884e637337d18d27910766b88ae1038a1dd36f2ecbddc504e8b6220522cc509fde9038e
-
SSDEEP
6144:qOaa4GFhnfN27m5lxsVjLLWHKTkrQk5zb9zRvphlQ0/vxiwEilMwDEh9HwOf6Lnr:QY7215Wbb9BXf7/BV7v
Static task
static1
Behavioral task
behavioral1
Sample
XClient_encrypted_obf_bat.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
74.12.129.6:7000
nPR0rvUPpd6dZNUx
-
install_file
USB.exe
Targets
-
-
Target
XClient_encrypted_obf_bat.bat
-
Size
540KB
-
MD5
7691f0a3619e34794c2d9f8acd645e30
-
SHA1
666541b63a9f6b808765e45b1238a2935b3be7a8
-
SHA256
0c17eb3ab5d7fdff6fcde1fee32a4183ec0928aa7ae77a74b140a128ed671b84
-
SHA512
76750941a254405f4477f989315db2ba5507dc8a6bb6c1091b4f0510a884e637337d18d27910766b88ae1038a1dd36f2ecbddc504e8b6220522cc509fde9038e
-
SSDEEP
6144:qOaa4GFhnfN27m5lxsVjLLWHKTkrQk5zb9zRvphlQ0/vxiwEilMwDEh9HwOf6Lnr:QY7215Wbb9BXf7/BV7v
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-