General
-
Target
999ec6f3dd5816786295500cd790941727bdaccb9640becf284938bda7cd73a9.bat
-
Size
64KB
-
Sample
250308-nyfzmawwfx
-
MD5
fef11d117754e450b937fd134f9dba13
-
SHA1
1024f7c99c81e39f0f53710d24e06ddea52082ad
-
SHA256
999ec6f3dd5816786295500cd790941727bdaccb9640becf284938bda7cd73a9
-
SHA512
db20ef27451bb79a9f21b9213e29e9ee40326c8b8dc28ba824a3aad3d901481ab18acd49d77ee0a2d68799853db5ed1ac9e76e8515070ee83632181a141a0bc4
-
SSDEEP
1536:8nDChFG71EIZWgZkbmEKUgXEXzICKUnFT3mKHWCW7zxk7Qvc5MCzAlZt:DHft3mK2Cuzv/H
Static task
static1
Behavioral task
behavioral1
Sample
999ec6f3dd5816786295500cd790941727bdaccb9640becf284938bda7cd73a9.bat
Resource
win7-20241023-en
Malware Config
Extracted
xworm
5.0
tripplebanks.duckdns.org:3399
bppouzbV7pFA6n72
-
install_file
USB.exe
Targets
-
-
Target
999ec6f3dd5816786295500cd790941727bdaccb9640becf284938bda7cd73a9.bat
-
Size
64KB
-
MD5
fef11d117754e450b937fd134f9dba13
-
SHA1
1024f7c99c81e39f0f53710d24e06ddea52082ad
-
SHA256
999ec6f3dd5816786295500cd790941727bdaccb9640becf284938bda7cd73a9
-
SHA512
db20ef27451bb79a9f21b9213e29e9ee40326c8b8dc28ba824a3aad3d901481ab18acd49d77ee0a2d68799853db5ed1ac9e76e8515070ee83632181a141a0bc4
-
SSDEEP
1536:8nDChFG71EIZWgZkbmEKUgXEXzICKUnFT3mKHWCW7zxk7Qvc5MCzAlZt:DHft3mK2Cuzv/H
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-