General
-
Target
Binaries.rar
-
Size
1019KB
-
Sample
250326-r299eswzg1
-
MD5
9f0a1e5448e276fd9a1868b08261b258
-
SHA1
bd0e596a0dacba429edc5d06ca23df7a6136682e
-
SHA256
5d112a86cfba7fc6a1a176b08fb203eb98d103ba95f9edf6adb72c70558f0c96
-
SHA512
3a81021e2bff42b1e861d791c9f9089853b5d8e44a8b12aa3f2018a6eba55ee3de3f744c75e2021f6570f7712b1dc1589ff1aa52a4804f02f2111dc3de0a2d52
-
SSDEEP
24576:uc7mwB4VdnJuGYlLS1GmezoXZUnfG4vLjcl7FpOR5wG24q+h:cU4TeVqaoXO+4vv+fORR24q2
Behavioral task
behavioral1
Sample
Binaries.rar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Binaries.rar
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
5.0
multi-referral.gl.at.ply.gg:43504
L9qlmFNDu8drSdGe
-
Install_directory
%Userprofile%
-
install_file
SecurityHealthSystray.exe
-
telegram
https://api.telegram.org/bot7999164804:AAFnlMmOEm_tg1MgP0Rjs4-EAp9cjIouFj4/sendMessage?chat_id=5462166893
Extracted
metasploit
windows/shell_reverse_tcp
147.185.221.26:43504
Targets
-
-
Target
Binaries.rar
-
Size
1019KB
-
MD5
9f0a1e5448e276fd9a1868b08261b258
-
SHA1
bd0e596a0dacba429edc5d06ca23df7a6136682e
-
SHA256
5d112a86cfba7fc6a1a176b08fb203eb98d103ba95f9edf6adb72c70558f0c96
-
SHA512
3a81021e2bff42b1e861d791c9f9089853b5d8e44a8b12aa3f2018a6eba55ee3de3f744c75e2021f6570f7712b1dc1589ff1aa52a4804f02f2111dc3de0a2d52
-
SSDEEP
24576:uc7mwB4VdnJuGYlLS1GmezoXZUnfG4vLjcl7FpOR5wG24q+h:cU4TeVqaoXO+4vv+fORR24q2
Score10/10-
Detect Xworm Payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-