General
-
Target
Cash_Transfer_REF#23284449-9374647.js
-
Size
7KB
-
Sample
231009-f6kzjsaf61
-
MD5
4e0ea5c5808c3d0cf7006eb0ef347c4b
-
SHA1
80f8f2d5b7caf2f13b1edd764e56f46930754edc
-
SHA256
d0ec40d1ae32bddb9159e4daa86d2b15535fe6cd456f8251d78fe64667d8abb1
-
SHA512
40745410c37e8cf392c59ca9c8d04779c96624eefe7b8f90f3876f8c54c60518a622db9553b0420f77b34582a586ec68b664089f909e37043a11c0d9734a44d4
-
SSDEEP
48:iVnz7HAx3ZSGwW6PnWe28gR7osdSrwyNNgnw5:itfHAx3ZzwWKWTnR7o8SrwqNgnw5
Static task
static1
Behavioral task
behavioral1
Sample
Cash_Transfer_REF#23284449-9374647.js
Resource
win7-20230831-en
Malware Config
Extracted
xworm
3.1
lee44.kozow.com:4548
Nkk86vl4S3wOFCBy
-
install_file
USB.exe
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
Cash_Transfer_REF#23284449-9374647.js
-
Size
7KB
-
MD5
4e0ea5c5808c3d0cf7006eb0ef347c4b
-
SHA1
80f8f2d5b7caf2f13b1edd764e56f46930754edc
-
SHA256
d0ec40d1ae32bddb9159e4daa86d2b15535fe6cd456f8251d78fe64667d8abb1
-
SHA512
40745410c37e8cf392c59ca9c8d04779c96624eefe7b8f90f3876f8c54c60518a622db9553b0420f77b34582a586ec68b664089f909e37043a11c0d9734a44d4
-
SSDEEP
48:iVnz7HAx3ZSGwW6PnWe28gR7osdSrwyNNgnw5:itfHAx3ZzwWKWTnR7o8SrwqNgnw5
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-