General
-
Target
awb_post_dhl_delivery_documents.pdf.bat
-
Size
64KB
-
Sample
250307-thf8casyfs
-
MD5
5badf099818dadbd971715163ca64bd9
-
SHA1
6064c6a53bc49018a8e1d58349b5e02b6e8e41cf
-
SHA256
e300cdc65dde1e6def171e9a88096f74efc7e6437fab37ad53e3cab5cfd81329
-
SHA512
b043a6e4f5a260a29217252d3ed5f4a374a7a7dba2607e64ba0c4ab551e6c590602590efe1ff096ae67329a19bc6c6e3b6c2738fa9b1cc6cd797749c26850a36
-
SSDEEP
1536:g2bQApZkbmEKUgXEXzICKUnFB8Y+Rw1VG3VnlLKA1wW9EmV:g2bQAoHfzz1sJJKcumV
Static task
static1
Behavioral task
behavioral1
Sample
awb_post_dhl_delivery_documents.pdf.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
freeetradingzone.duckdns.org:3911
WrODfHPJku8Xvqoy
-
install_file
USB.exe
Targets
-
-
Target
awb_post_dhl_delivery_documents.pdf.bat
-
Size
64KB
-
MD5
5badf099818dadbd971715163ca64bd9
-
SHA1
6064c6a53bc49018a8e1d58349b5e02b6e8e41cf
-
SHA256
e300cdc65dde1e6def171e9a88096f74efc7e6437fab37ad53e3cab5cfd81329
-
SHA512
b043a6e4f5a260a29217252d3ed5f4a374a7a7dba2607e64ba0c4ab551e6c590602590efe1ff096ae67329a19bc6c6e3b6c2738fa9b1cc6cd797749c26850a36
-
SSDEEP
1536:g2bQApZkbmEKUgXEXzICKUnFB8Y+Rw1VG3VnlLKA1wW9EmV:g2bQAoHfzz1sJJKcumV
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-