General
-
Target
file.exe
-
Size
745KB
-
Sample
250415-tfxsbatvat
-
MD5
1a9fcbfd38322f7ebeb68a1ba8619b26
-
SHA1
f681eeced7bf6351257e9af38fd1fd858f7fbb12
-
SHA256
cb3156d5b2ef104580e96cb03430fed58cbfdeed6e70874e825dd7221d26379d
-
SHA512
fe981c04256bc21243b81f051632b1dbb00ded111cf73f6515adac3aeb59f63ec7e8026da31e832d8ec50167edab0844799911ab1a027592ac8fa44836100606
-
SSDEEP
12288:ho8gdP8GLDbfgtsJdjlbr4JtPp7nou4/ZUUAfDCDuxNETymj26:zOzb4sJXmtx7oFbU
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
-
install_file
MasonUSB.exe
Extracted
latentbot
cryptoghost.zapto.org
Targets
-
-
Target
file.exe
-
Size
745KB
-
MD5
1a9fcbfd38322f7ebeb68a1ba8619b26
-
SHA1
f681eeced7bf6351257e9af38fd1fd858f7fbb12
-
SHA256
cb3156d5b2ef104580e96cb03430fed58cbfdeed6e70874e825dd7221d26379d
-
SHA512
fe981c04256bc21243b81f051632b1dbb00ded111cf73f6515adac3aeb59f63ec7e8026da31e832d8ec50167edab0844799911ab1a027592ac8fa44836100606
-
SSDEEP
12288:ho8gdP8GLDbfgtsJdjlbr4JtPp7nou4/ZUUAfDCDuxNETymj26:zOzb4sJXmtx7oFbU
-
Detect Xworm Payload
-
Latentbot family
-
Xworm family
-
Legitimate hosting services abused for malware hosting/C2
-