Sample name: | 17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exe |
Analysis ID: | 1561552 |
MD5: | 49dc4ee55a1efd095a37979f88b9080c |
SHA1: | fedf426141c227a67df1dcde19182abc46cac369 |
SHA256: | 1896c48f7355a6d6f54df73e79e1176a069f2df15a7afb09f77974fd4d08cf5e |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Errors
|
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
|
AV Detection |
---|
Source: |
Joe Sandbox ML: |
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
UDP traffic detected without corresponding DNS query: |
Source: |
DNS traffic detected: |
System Summary |
---|
Source: |
Matched rule: |
Source: |
Static PE information: |
Source: |
Binary or memory string: |
Source: |
Static PE information: |
Source: |
Matched rule: |
Source: |
Classification label: |
Source: |
Static PE information: |
Source: |
Static file information: |
Source: |
Static PE information: |
Source: |
Static PE information: |
Stealing of Sensitive Information |
---|
Source: |
File source: |
Remote Access Functionality |
---|
Source: |
File source: |
Name | IP | Active |
---|---|---|
bg.microsoft.map.fastly.net | 199.232.214.172 | true |
s-part-0035.t-0009.t-msedge.net | 13.107.246.63 | true |
ax-0001.ax-msedge.net | 150.171.27.10 | true |
tse1.mm.bing.net | unknown | unknown |