General
-
Target
z35awb_shipping.bat
-
Size
91KB
-
Sample
250520-1wvq8acr3w
-
MD5
e3b482a015f3f7fb9c1853f67c2de7fd
-
SHA1
feb4018e5a0deac27f074ede93d373455a5dacb4
-
SHA256
1ba574b61dca255ef93e884d9cbad520403166562a7ae8ce28417080d52fe0a7
-
SHA512
5d25a027754d2ea0d5efe9a88b585880c3b845b255e913243e22c6dd97f19ebf7ca2853809025cd99d419cae8c986e519832009ac5b1288ccae1041ddb25e436
-
SSDEEP
1536:ZqEuRW8rD+XNdZkbmEKUgXEXzICKUnFU0RYYFee0HaypNyl2m3Wacp5R/DiBffB4:ZduRRrWGHf2qeJ6yzyEOEHR/Ok
Static task
static1
Malware Config
Extracted
xworm
5.0
wealthytradesbanks.duckdns.org:3033
3UlkrphpC1fTkFRi
-
install_file
USB.exe
Targets
-
-
Target
z35awb_shipping.bat
-
Size
91KB
-
MD5
e3b482a015f3f7fb9c1853f67c2de7fd
-
SHA1
feb4018e5a0deac27f074ede93d373455a5dacb4
-
SHA256
1ba574b61dca255ef93e884d9cbad520403166562a7ae8ce28417080d52fe0a7
-
SHA512
5d25a027754d2ea0d5efe9a88b585880c3b845b255e913243e22c6dd97f19ebf7ca2853809025cd99d419cae8c986e519832009ac5b1288ccae1041ddb25e436
-
SSDEEP
1536:ZqEuRW8rD+XNdZkbmEKUgXEXzICKUnFU0RYYFee0HaypNyl2m3Wacp5R/DiBffB4:ZduRRrWGHf2qeJ6yzyEOEHR/Ok
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Drops startup file
-