General
-
Target
cmd.bat
-
Size
179B
-
Sample
250307-e8ckhstydy
-
MD5
de7481e65ab0afc6d3928aeed6b20b7d
-
SHA1
9590ec1a379ae574c161aadc5ece66c185adb072
-
SHA256
89e11b195c89fc104208da51765503cc941c169ef118c8180d268dd1ecf8d096
-
SHA512
65ca342a1251c7954cc74877155afacc9d111b1039f3a773e07f5dcf6b98b76eb1147fd6091152f5ffd827b1bb4971d9d80c295bb744c2199c475d71f536cf67
Static task
static1
Behavioral task
behavioral1
Sample
cmd.bat
Resource
win7-20241023-en
Malware Config
Extracted
http://185.7.214.54/a.mp4
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Targets
-
-
Target
cmd.bat
-
Size
179B
-
MD5
de7481e65ab0afc6d3928aeed6b20b7d
-
SHA1
9590ec1a379ae574c161aadc5ece66c185adb072
-
SHA256
89e11b195c89fc104208da51765503cc941c169ef118c8180d268dd1ecf8d096
-
SHA512
65ca342a1251c7954cc74877155afacc9d111b1039f3a773e07f5dcf6b98b76eb1147fd6091152f5ffd827b1bb4971d9d80c295bb744c2199c475d71f536cf67
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-