General
-
Target
awb_post_dhl_delivery_documents_07_03_2025_00000000000250507.bat
-
Size
64KB
-
Sample
250307-fejmeavnt7
-
MD5
6ac676101e5cc6f9b723060ffafd7168
-
SHA1
d1f888277d5a627862316a8a81d90e1a3dd19ee2
-
SHA256
dac0285f7cc9ae45f5c79314a20853c5d9e1071bf657260f7fa34ae8f35a2ec9
-
SHA512
8a5417c33e37cce7c58e3dc132d24104b6a9599e2788df9ca3e040b04241ae82d77c4709baa210cc06b638dd6a1ab188f27928db93df203b6b14e9c1a43d41cd
-
SSDEEP
1536:IZkbmEKUgXEXzICKUnFP25y3Nm8RiepC+gR1LKT6x6bsLO:lHflwYigiHKTW6bsLO
Static task
static1
Malware Config
Extracted
xworm
5.0
tripplebanks.duckdns.org:3399
bppouzbV7pFA6n72
-
install_file
USB.exe
Targets
-
-
Target
awb_post_dhl_delivery_documents_07_03_2025_00000000000250507.bat
-
Size
64KB
-
MD5
6ac676101e5cc6f9b723060ffafd7168
-
SHA1
d1f888277d5a627862316a8a81d90e1a3dd19ee2
-
SHA256
dac0285f7cc9ae45f5c79314a20853c5d9e1071bf657260f7fa34ae8f35a2ec9
-
SHA512
8a5417c33e37cce7c58e3dc132d24104b6a9599e2788df9ca3e040b04241ae82d77c4709baa210cc06b638dd6a1ab188f27928db93df203b6b14e9c1a43d41cd
-
SSDEEP
1536:IZkbmEKUgXEXzICKUnFP25y3Nm8RiepC+gR1LKT6x6bsLO:lHflwYigiHKTW6bsLO
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-