Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
|
AV Detection |
---|
Source: |
Malware Configuration Extractor: |
Source: |
ReversingLabs: |
Source: |
Integrated Neural Analysis Model: |
Source: |
Joe Sandbox ML: |
Source: |
String decryptor: |
||
Source: |
String decryptor: |
||
Source: |
String decryptor: |
||
Source: |
String decryptor: |
||
Source: |
String decryptor: |
||
Source: |
String decryptor: |
||
Source: |
String decryptor: |
||
Source: |
String decryptor: |
Source: |
Static PE information: |
Source: |
Binary string: |
||
Source: |
Binary string: |
||
Source: |
Binary string: |
||
Source: |
Binary string: |
Source: |
Code function: |
0_2_00452126 | |
Source: |
Code function: |
0_2_0045C999 | |
Source: |
Code function: |
0_2_00436ADE | |
Source: |
Code function: |
0_2_00434BEE | |
Source: |
Code function: |
0_2_0045DD7C | |
Source: |
Code function: |
0_2_0044BD29 | |
Source: |
Code function: |
0_2_00436D2D | |
Source: |
Code function: |
0_2_00442E1F | |
Source: |
Code function: |
0_2_00475FE5 | |
Source: |
Code function: |
0_2_0044BF8D |
Networking |
---|
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
Source: |
URLs: |
Source: |
TCP traffic: |
Source: |
ASN Name: |
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
||
Source: |
TCP traffic detected without corresponding DNS query: |
Source: |
Code function: |
0_2_0044289D |
Source: |
String found in binary or memory: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: |
.Net Code: |
Source: |
Code function: |
0_2_0046C5D0 |
Source: |
Code function: |
0_2_00459FFF |
Source: |
Code function: |
0_2_0046C5D0 |
Source: |
Code function: |
0_2_00456354 |
Source: |
Code function: |
0_2_0047C08E |
System Summary |
---|
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
Source: |
Process Stats: |
Source: |
Code function: |
0_2_00434D50 |
Source: |
Code function: |
0_2_004461ED |
Source: |
Code function: |
0_2_004364AA |
Source: |
Code function: |
0_2_00409A40 | |
Source: |
Code function: |
0_2_00412038 | |
Source: |
Code function: |
0_2_00427161 | |
Source: |
Code function: |
0_2_0047E1FA | |
Source: |
Code function: |
0_2_004212BE | |
Source: |
Code function: |
0_2_00443390 | |
Source: |
Code function: |
0_2_00443391 | |
Source: |
Code function: |
0_2_0041A46B | |
Source: |
Code function: |
0_2_0041240C | |
Source: |
Code function: |
0_2_00446566 | |
Source: |
Code function: |
0_2_004045E0 | |
Source: |
Code function: |
0_2_0041D750 | |
Source: |
Code function: |
0_2_004037E0 | |
Source: |
Code function: |
0_2_00427859 | |
Source: |
Code function: |
0_2_00412818 | |
Source: |
Code function: |
0_2_0040F890 | |
Source: |
Code function: |
0_2_0042397B | |
Source: |
Code function: |
0_2_00411B63 | |
Source: |
Code function: |
0_2_0047CBF0 | |
Source: |
Code function: |
0_2_0044EBBC | |
Source: |
Code function: |
0_2_00412C38 | |
Source: |
Code function: |
0_2_0044ED9A | |
Source: |
Code function: |
0_2_00423EBF | |
Source: |
Code function: |
0_2_00424F70 | |
Source: |
Code function: |
0_2_0041AF0D | |
Source: |
Code function: |
0_2_03D62B60 | |
Source: |
Code function: |
2_2_021B4468 | |
Source: |
Code function: |
2_2_021BF250 | |
Source: |
Code function: |
2_2_021B1328 | |
Source: |
Code function: |
2_2_021B3E71 | |
Source: |
Code function: |
2_2_021B1948 |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Source: |
Static PE information: |
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
||
Source: |
Matched rule: |
Source: |
Cryptographic APIs: |
||
Source: |
Cryptographic APIs: |
||
Source: |
Cryptographic APIs: |
Source: |
Classification label: |
Source: |
Code function: |
0_2_0044AF5C |
Source: |
Code function: |
0_2_00464422 | |
Source: |
Code function: |
0_2_004364AA |
Source: |
Code function: |
0_2_0045D517 |
Source: |
Code function: |
0_2_0043701F |
Source: |
Code function: |
0_2_0047A999 |
Source: |
Code function: |
0_2_0043614F |
Source: |
File created: |
Jump to behavior |
Source: |
Mutant created: |
||
Source: |
Mutant created: |
Source: |
File created: |
Jump to behavior |
Source: |
Static PE information: |
Source: |
File read: |
Jump to behavior |
Source: |
Key opened: |
Jump to behavior |
Source: |
ReversingLabs: |
Source: |
File read: |
Jump to behavior |
Source: |
Process created: |
|||
Source: |
Process created: |
|||
Source: |
Process created: |
Jump to behavior |
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior | ||
Source: |
Section loaded: |
Jump to behavior |
Source: |
Key value queried: |
Jump to behavior |
Source: |
LNK file: |
Source: |
Binary string: |
||
Source: |
Binary string: |
||
Source: |
Binary string: |
||
Source: |
Binary string: |
Data Obfuscation |
---|
Source: |
.Net Code: |
||
Source: |
.Net Code: |
Source: |
.Net Code: |
||
Source: |
.Net Code: |
||
Source: |
.Net Code: |
Source: |
Code function: |
0_2_0040EB70 |
Source: |
Static PE information: |
Source: |
Code function: |
0_2_004171E4 |
Source: |
File created: |
Jump to dropped file |
Source: |
File created: |
Jump to behavior |
Source: |
File created: |
Jump to behavior |
Source: |
Code function: |
0_2_004772DE | |
Source: |
Code function: |
0_2_004375B0 |
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior |
Malware Analysis System Evasion |
---|
Source: |
Code function: |
0_2_00444078 |
Source: |
WMI Queries: |
Source: |
API/Special instruction interceptor: |
Source: |
Thread delayed: |
Jump to behavior |
Source: |
Window / User API: |
Jump to behavior | ||
Source: |
Window / User API: |
Jump to behavior |
Source: |
API coverage: |
Source: |
File Volume queried: |
Jump to behavior | ||
Source: |
File Volume queried: |
Jump to behavior |
Source: |
Code function: |
0_2_00452126 | |
Source: |
Code function: |
0_2_0045C999 | |
Source: |
Code function: |
0_2_00436ADE | |
Source: |
Code function: |
0_2_00434BEE | |
Source: |
Code function: |
0_2_0045DD7C | |
Source: |
Code function: |
0_2_0044BD29 | |
Source: |
Code function: |
0_2_00436D2D | |
Source: |
Code function: |
0_2_00442E1F | |
Source: |
Code function: |
0_2_00475FE5 | |
Source: |
Code function: |
0_2_0044BF8D |
Source: |
Code function: |
0_2_0040E470 |
Source: |
Thread delayed: |
Jump to behavior |
Source: |
Binary or memory string: |
Source: |
Code function: |
0_2_0045A259 |
Source: |
Code function: |
0_2_0040D6D0 |
Source: |
Code function: |
0_2_0040EB70 |
Source: |
Code function: |
0_2_03D613A0 | |
Source: |
Code function: |
0_2_03D62A50 | |
Source: |
Code function: |
0_2_03D629F0 |
Source: |
Code function: |
0_2_00426DA1 |
Source: |
Code function: |
0_2_0042202E | |
Source: |
Code function: |
0_2_004230F5 | |
Source: |
Code function: |
0_2_00417D93 | |
Source: |
Code function: |
0_2_00421FA7 |
Source: |
Memory allocated: |
Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: |
Section loaded: |
Jump to behavior |
Source: |
Memory written: |
Jump to behavior |
Source: |
Code function: |
0_2_0043916A |
Source: |
Code function: |
0_2_0040D6D0 |
Source: |
Code function: |
0_2_004375B0 |
Source: |
Code function: |
0_2_00436431 |
Source: |
Process created: |
Jump to behavior |
Source: |
Code function: |
0_2_00445DD3 |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Source: |
Code function: |
0_2_00410D10 |
Source: |
Queries volume information: |
Jump to behavior | ||
Source: |
Queries volume information: |
Jump to behavior | ||
Source: |
Queries volume information: |
Jump to behavior | ||
Source: |
Queries volume information: |
Jump to behavior | ||
Source: |
Queries volume information: |
Jump to behavior | ||
Source: |
Queries volume information: |
Jump to behavior |
Source: |
Code function: |
0_2_004223BC |
Source: |
Code function: |
0_2_004711D2 |
Source: |
Code function: |
0_2_0040E470 |
Source: |
Key value queried: |
Jump to behavior |
Source: |
WMI Queries: |
Stealing of Sensitive Information |
---|
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Remote Access Functionality |
---|
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
||
Source: |
File source: |
Source: |
Code function: |
0_2_004741BB | |
Source: |
Code function: |
0_2_0046483C | |
Source: |
Code function: |
0_2_0047AD92 |
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
154.216.18.238 | unknown | Seychelles | 135357 | SKHT-ASShenzhenKatherineHengTechnologyInformationCo | true |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
|
unknown |