General
-
Target
a.ps1
-
Size
509B
-
Sample
250307-fbgcwatyft
-
MD5
5ffc54e178b40c65b7d2fb357492baf5
-
SHA1
d59d533638f1a755fc37129796e7731ccb6206a8
-
SHA256
7fe172c67413d3bcc1b2ae93b2cbd21eec0aa8a31198828c7dc04a310f9677cc
-
SHA512
57bcc6b7e00d4638db2d99aef02d5c06c67aee0250db7c3b23fbafa0aaeca0e0df90df1d7258a9ba65db4077ed8548a7e7b391706e28086958e8d9d087d5111c
Static task
static1
Behavioral task
behavioral1
Sample
a.ps1
Resource
win7-20241010-en
Malware Config
Extracted
http://185.7.214.54/fg.exe
Extracted
xworm
5.0
185.7.214.108:4411
185.7.214.54:4411
Targets
-
-
Target
a.ps1
-
Size
509B
-
MD5
5ffc54e178b40c65b7d2fb357492baf5
-
SHA1
d59d533638f1a755fc37129796e7731ccb6206a8
-
SHA256
7fe172c67413d3bcc1b2ae93b2cbd21eec0aa8a31198828c7dc04a310f9677cc
-
SHA512
57bcc6b7e00d4638db2d99aef02d5c06c67aee0250db7c3b23fbafa0aaeca0e0df90df1d7258a9ba65db4077ed8548a7e7b391706e28086958e8d9d087d5111c
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-