General
-
Target
aliu1.ps1
-
Size
1.6MB
-
Sample
250307-sknjrsssbs
-
MD5
4a319c9e02e40a2b6e8351b8a29fce00
-
SHA1
8402349210dbc3878be22625c374b821d148d70b
-
SHA256
4f43e8d90f82a6556d354a707fcbd355528755c0089e254ad249694855f26047
-
SHA512
abecb6b8b3fbcc7b67e7a5cb3da0dda9309e4f0044da79206e818db718d7cea73202704ba9f1ae6c928e11e26b832cae8dca932688373bea76af4e4346b2f5be
-
SSDEEP
24576:vfyaQV6q4wOViv+ZinOIHtr1bqeNhI2LXteG4UGG28mcbYAJfQUKw4wNgUQkcf3o:ePOViycbrWg974PGhbZCwNc6uu
Static task
static1
Behavioral task
behavioral1
Sample
aliu1.ps1
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
193.32.177.63:6000
wwD0bshguVCRSd3k
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7238632531:AAGCQZAh03hAwOcuP9HUeoAP5AQV0o0tp24/sendMessage?chat_id=8080837794
Targets
-
-
Target
aliu1.ps1
-
Size
1.6MB
-
MD5
4a319c9e02e40a2b6e8351b8a29fce00
-
SHA1
8402349210dbc3878be22625c374b821d148d70b
-
SHA256
4f43e8d90f82a6556d354a707fcbd355528755c0089e254ad249694855f26047
-
SHA512
abecb6b8b3fbcc7b67e7a5cb3da0dda9309e4f0044da79206e818db718d7cea73202704ba9f1ae6c928e11e26b832cae8dca932688373bea76af4e4346b2f5be
-
SSDEEP
24576:vfyaQV6q4wOViv+ZinOIHtr1bqeNhI2LXteG4UGG28mcbYAJfQUKw4wNgUQkcf3o:ePOViycbrWg974PGhbZCwNc6uu
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-