General
-
Target
file.exe
-
Size
1.5MB
-
Sample
250415-tfxsbatvav
-
MD5
331c0633d4eaecd87c39180f7f350769
-
SHA1
7339299f301e2bf82989029391366da000f53bc6
-
SHA256
573b6b682ba79aa17aea93a00e8c9f4b3b8d90f177f219682e879bf15c32c55d
-
SHA512
7edb099b0566bdb365545bf3f5f28e937141eb3eacf33877ee1f2d1aee65fe429a741aba03bbd92d37a1e93ff5f8fe18ea4d53b957abb06e40c598495fcfaec7
-
SSDEEP
24576:fBGIMKfL6k4fP133M+Rvf9rJ9UpENLKmgUmVGn0LQ:fBGIrfL6kIP133TR39rPUGNLKmegn0L
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
xworm
-
install_file
MasonUSB.exe
Extracted
latentbot
cryptoghost.zapto.org
Targets
-
-
Target
file.exe
-
Size
1.5MB
-
MD5
331c0633d4eaecd87c39180f7f350769
-
SHA1
7339299f301e2bf82989029391366da000f53bc6
-
SHA256
573b6b682ba79aa17aea93a00e8c9f4b3b8d90f177f219682e879bf15c32c55d
-
SHA512
7edb099b0566bdb365545bf3f5f28e937141eb3eacf33877ee1f2d1aee65fe429a741aba03bbd92d37a1e93ff5f8fe18ea4d53b957abb06e40c598495fcfaec7
-
SSDEEP
24576:fBGIMKfL6k4fP133M+Rvf9rJ9UpENLKmgUmVGn0LQ:fBGIrfL6kIP133TR39rPUGNLKmegn0L
-
Detect Xworm Payload
-
Latentbot family
-
Xworm family
-
Legitimate hosting services abused for malware hosting/C2
-