General
-
Target
krTVmufRVRif.bat
-
Size
4.3MB
-
Sample
250308-lgkkdavtey
-
MD5
c475591ab334bd766b868d4d706938db
-
SHA1
0e89e12020e858db58b4f8e250c6fea7e03ed95e
-
SHA256
38908b3b24f91dd837b7f3730f9e0258337f26274ce71bc2f299c5662247fcf6
-
SHA512
3611b20c0f2918abb33c7869a3755ad78a274dfaab8c69768bd3e3a8762837dedb8b45c64133133dd6d60b8986ca9cfb0db79c0b27cb9bb4cbd7138f286bc28b
-
SSDEEP
49152:ei50ntRXxAgH2DWZIRrcbzwilGN7BQxYa831JNBQiHCywLILOcLwSpXKEf:/
Static task
static1
Behavioral task
behavioral1
Sample
krTVmufRVRif.bat
Resource
win7-20241023-en
Malware Config
Extracted
xworm
5.0
meowycatty.ddns.net:8843
jRccj8SKwN7fQIlB
-
install_file
USB.exe
Targets
-
-
Target
krTVmufRVRif.bat
-
Size
4.3MB
-
MD5
c475591ab334bd766b868d4d706938db
-
SHA1
0e89e12020e858db58b4f8e250c6fea7e03ed95e
-
SHA256
38908b3b24f91dd837b7f3730f9e0258337f26274ce71bc2f299c5662247fcf6
-
SHA512
3611b20c0f2918abb33c7869a3755ad78a274dfaab8c69768bd3e3a8762837dedb8b45c64133133dd6d60b8986ca9cfb0db79c0b27cb9bb4cbd7138f286bc28b
-
SSDEEP
49152:ei50ntRXxAgH2DWZIRrcbzwilGN7BQxYa831JNBQiHCywLILOcLwSpXKEf:/
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Deletes itself
-