General
-
Target
knc.zip
-
Size
7KB
-
Sample
231128-krvmnagf42
-
MD5
6203721dce5e9f3b79749a6d8fc1632c
-
SHA1
4e483503c2ade44bbae460bf127fc5390bd87562
-
SHA256
bf1e9cc586973192afe5fd7c95b063d21870af1388da1d826a93c5efb7f010da
-
SHA512
30eee71b5fcd20862b3cf2a4504d12d628f742237c6fc9ed631fdd942f7d22f10010b5869e7013017cbf6bb5778af08cf9ac28d477868bc4ed171efc4d3bd3f3
-
SSDEEP
96:e8TLcK4RadQ+HSzJhKBBfJ/IaO2mts1M7zEEUMgQSgTrQuxUpSQqmgwAsvtnSPWt:1aKWkZIa/QEEUMxSmHUpePccHW0fQtlp
Static task
static1
Malware Config
Extracted
https://uploaddeimagens.com.br/images/004/674/364/original/vbsss.jpg?1700999331
https://uploaddeimagens.com.br/images/004/674/364/original/vbsss.jpg?1700999331
Extracted
xworm
3.1
freed12.duckdns.org:7000
f9MuQijmg8E7F8xa
-
install_file
USB.exe
Targets
-
-
Target
softbankNDNCagreementPDF.vbs
-
Size
198KB
-
MD5
d4a13ff61d8f00b0e18d6d0add1c5796
-
SHA1
681f3f3ec1537b3f1ae58921c8014cb7d23ce0c0
-
SHA256
d76e889cf2575622ca27fcb43a4bfd4df2dba3cfdd3175c28abdef00d541eaa3
-
SHA512
426511e9408474ce3923bad62e745b2a13bbe37a9f95d785ae3082afa163ecda02c14e6b2d6c8caae4a43bb8bed1386f4389a7fed32d3608d6386c3eec2d8537
-
SSDEEP
3072:e1XQyor2jokDq30ojrDq3YoT2bok2uoQ2EonDUoupCo82oo31oPioM7cotcjOeMH:1
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Drops startup file
-
Suspicious use of SetThreadContext
-