General
-
Target
51eb6f93ce575ef4eedabd514acd4114cf177bcbfeab9651eb9ce13c10912152
-
Size
45KB
-
Sample
231101-armlyaga6t
-
MD5
cd4a682fb0201a9f50d9498bc00b9dfa
-
SHA1
56e36afb1fd723332e5d4301aa134a1665261ad3
-
SHA256
51eb6f93ce575ef4eedabd514acd4114cf177bcbfeab9651eb9ce13c10912152
-
SHA512
656b6fd4d919eac7a28a3695ad26f5601882c9d841cba3ee71fb1a8a5085146a0628d7d0e7fa86dc8e4bdb25a3c92704dac38777c35c6b7c2f0abee3b687026e
-
SSDEEP
768:4/JBtMcyFGvgkCTLhvDziOz1H8wox4P0wtxpVTthfXtGi3qS/UAtGsKTdu2gxvE:IBQTNvnig18wo+/txp1XtGi3qPAt+LgW
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-10004_PTT プロジェクト·pdf.vbs
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
RFQ-10004_PTT プロジェクト·pdf.vbs
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
RFQ-10004_PTT プロジェクト·pdf.vbs
-
Size
88KB
-
MD5
e694956dd9c113fbc759db1e978576a4
-
SHA1
5e901b13dc38ff3c934dda1d620ac2368f3026aa
-
SHA256
9d26fc8d853b4c53fb0fc10e84939790b8bcdc1d8c1c1de43ec36ff204ed5d92
-
SHA512
40b2e4d5bdfc2a6767ec7a92828de8d57c7c1685c8e671441ed6292261ae54022815f297970467f0ff11a78b8cd28c3a151188ceca558eae1b493518b128b436
-
SSDEEP
1536:AtWVkKDBxCjcPljwZ9tXbLZNyIi+CWiwKQtJHOXtS1Kiw2OFeBujpy4:aOFBxyc9jwZ95LRi+r3LtV2tSYiw2see
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-