General
-
Target
jMUMLUo.exe
-
Size
457KB
-
Sample
250507-h15swagq5t
-
MD5
1e70a2fafdd1c76b81e6e5e384e93cb6
-
SHA1
d780f38939d5f9541315f1e6b29ba3e0c6fe7292
-
SHA256
37883f9acd439e989fa665b51fe2b1b46e41a9551c6460c0bbf9c7adcd785023
-
SHA512
a6904c053699de4d42cc47a94fad38638d246ef9856c669f321f28b32099be5a41cd3e6075e078f580e076cfd0ed2f9872dbc110ebbbd76e6ac7d5739fc9f19a
-
SSDEEP
12288:5JFV8FKStnVclYq4YpJr8SfHSWMwkahCqLN1a+wjb:hVnENYp9dfqwkaIR
Static task
static1
Behavioral task
behavioral1
Sample
jMUMLUo.exe
Resource
win10v2004-20250502-en
Malware Config
Targets
-
-
Target
jMUMLUo.exe
-
Size
457KB
-
MD5
1e70a2fafdd1c76b81e6e5e384e93cb6
-
SHA1
d780f38939d5f9541315f1e6b29ba3e0c6fe7292
-
SHA256
37883f9acd439e989fa665b51fe2b1b46e41a9551c6460c0bbf9c7adcd785023
-
SHA512
a6904c053699de4d42cc47a94fad38638d246ef9856c669f321f28b32099be5a41cd3e6075e078f580e076cfd0ed2f9872dbc110ebbbd76e6ac7d5739fc9f19a
-
SSDEEP
12288:5JFV8FKStnVclYq4YpJr8SfHSWMwkahCqLN1a+wjb:hVnENYp9dfqwkaIR
Score10/10-
Detect Xworm Payload
-
Detects DonutLoader
-
DonutLoader
DonutLoader is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies.
-
Donutloader family
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1