General
-
Target
script.ps1
-
Size
50B
-
Sample
250308-wc29qszyd1
-
MD5
f7907aaa36ecbdf6ea474650bea2b747
-
SHA1
11356251ecc1dca11f6e372197d4d757dd6eb43d
-
SHA256
30d852a6064a9f9e57981364edbee0c7a1fecc1d9681bb2a9255e3b13da0c67f
-
SHA512
8c61c47b5d20e41147bbe3c737cf033bf00392e6dd69f8fab6dca4f54170378fef7233dccf7d8c1eabc322240e920168ed9920af0a3a83a1d13d212eff82b25e
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
script.ps1
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
127.0.0.1:49201
3SQiK66LLWxWTFFs
-
install_file
USB.exe
Targets
-
-
Target
script.ps1
-
Size
50B
-
MD5
f7907aaa36ecbdf6ea474650bea2b747
-
SHA1
11356251ecc1dca11f6e372197d4d757dd6eb43d
-
SHA256
30d852a6064a9f9e57981364edbee0c7a1fecc1d9681bb2a9255e3b13da0c67f
-
SHA512
8c61c47b5d20e41147bbe3c737cf033bf00392e6dd69f8fab6dca4f54170378fef7233dccf7d8c1eabc322240e920168ed9920af0a3a83a1d13d212eff82b25e
Score10/10-
Detect Xworm Payload
-
UAC bypass
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-