General
-
Target
zqdZqQhxI1QOUR2.exe
-
Size
495KB
-
Sample
231012-pch3jahe6v
-
MD5
ddbc0653ec3a10b67141e6f8ec498a7e
-
SHA1
754e3c014f59c3b06461f4fcf651f84109e94a5a
-
SHA256
40bd3a3b31b4aee8d5b7895ec1108de6bdb2351ee68ebc288cc54c0a10079c73
-
SHA512
0e14f035314988c278cde4805ef249f394773e6f34a6e000c825d1fb0c105ff952d04569ac27fbca775a76e24eb64a8ababe87c52cb0ba808e5efd11c1ed2d1a
-
SSDEEP
12288:hZi34AfJw1UGUTazCmhDoFS2TH/9h5sJwZLMVPSSHDfJ:biBwqTmoc8fVsI09jB
Static task
static1
Behavioral task
behavioral1
Sample
zqdZqQhxI1QOUR2.exe
Resource
win7-20230831-en
Malware Config
Extracted
xworm
3.1
chikes17.duckdns.org:7000
JU8kX1cZxdKHfS72
-
install_file
USB.exe
Targets
-
-
Target
zqdZqQhxI1QOUR2.exe
-
Size
495KB
-
MD5
ddbc0653ec3a10b67141e6f8ec498a7e
-
SHA1
754e3c014f59c3b06461f4fcf651f84109e94a5a
-
SHA256
40bd3a3b31b4aee8d5b7895ec1108de6bdb2351ee68ebc288cc54c0a10079c73
-
SHA512
0e14f035314988c278cde4805ef249f394773e6f34a6e000c825d1fb0c105ff952d04569ac27fbca775a76e24eb64a8ababe87c52cb0ba808e5efd11c1ed2d1a
-
SSDEEP
12288:hZi34AfJw1UGUTazCmhDoFS2TH/9h5sJwZLMVPSSHDfJ:biBwqTmoc8fVsI09jB
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-