Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/04/2025, 16:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20250410-en
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
331c0633d4eaecd87c39180f7f350769
-
SHA1
7339299f301e2bf82989029391366da000f53bc6
-
SHA256
573b6b682ba79aa17aea93a00e8c9f4b3b8d90f177f219682e879bf15c32c55d
-
SHA512
7edb099b0566bdb365545bf3f5f28e937141eb3eacf33877ee1f2d1aee65fe429a741aba03bbd92d37a1e93ff5f8fe18ea4d53b957abb06e40c598495fcfaec7
-
SSDEEP
24576:fBGIMKfL6k4fP133M+Rvf9rJ9UpENLKmgUmVGn0LQ:fBGIrfL6kIP133TR39rPUGNLKmegn0L
Malware Config
Extracted
Family
xworm
Attributes
-
install_file
MasonUSB.exe
Extracted
Family
latentbot
C2
cryptoghost.zapto.org
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4128-4-0x000000001AF00000-0x000000001AF12000-memory.dmp family_xworm -
Latentbot family
-
Xworm family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 2 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4128 file.exe