General
-
Target
file.exe
-
Size
744KB
-
Sample
250415-tfx33stvay
-
MD5
df8fde109ecc254425dfbfc013818133
-
SHA1
66f927b7a699556f70f36c5d54f0c650a0d54bf9
-
SHA256
6c2fe5baef8298cadbe66247a32d87c3dddbbd3a5b5ea356383b8d6837fe437a
-
SHA512
1d3cdcd2d92df4bb55ed3346fe79e8eab267ab83e2e824adf3966c76bc329218528ea710743208b80c90067d0ff8b92378629dacc9d5ce09ceacbeafaae811b1
-
SSDEEP
12288:1qCPeZdxQgEd7MZlvVoYBBrPH2K7MiF73BE3TCvVGb+Gob:1qCGZdxQg6oTv+YBBr+K7MiVBEjCvVew
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
xworm
-
install_file
MasonUSB.exe
Extracted
latentbot
cryptoghost.zapto.org
Targets
-
-
Target
file.exe
-
Size
744KB
-
MD5
df8fde109ecc254425dfbfc013818133
-
SHA1
66f927b7a699556f70f36c5d54f0c650a0d54bf9
-
SHA256
6c2fe5baef8298cadbe66247a32d87c3dddbbd3a5b5ea356383b8d6837fe437a
-
SHA512
1d3cdcd2d92df4bb55ed3346fe79e8eab267ab83e2e824adf3966c76bc329218528ea710743208b80c90067d0ff8b92378629dacc9d5ce09ceacbeafaae811b1
-
SSDEEP
12288:1qCPeZdxQgEd7MZlvVoYBBrPH2K7MiF73BE3TCvVGb+Gob:1qCGZdxQg6oTv+YBBr+K7MiVBEjCvVew
-
Detect Xworm Payload
-
Latentbot family
-
Xworm family
-
Legitimate hosting services abused for malware hosting/C2
-