General
-
Target
img logger.hta
-
Size
998B
-
Sample
240203-zk72qsccgj
-
MD5
e9f8d2cbd98b827b2be314738d7a56dc
-
SHA1
bf603cda72ed3e93c6583a5df3900672d2f3b77a
-
SHA256
4beb6d6789d5780824d83f4920d21f7db21349573b11d8473879b44e6a101926
-
SHA512
27cdc567d63613b2f879583eabbd45f6f8bb9ba0af6976c47ba2fa7791e5c07dc9bdf628769f6b0f8face5f76175ad08a263507228a8aa10b3cf4eb572202023
Static task
static1
Behavioral task
behavioral1
Sample
img logger.hta
Resource
win7-20231215-en
Malware Config
Extracted
xworm
https://pastebin.com/raw/iTFsRfJn:180508
-
Install_directory
%ProgramData%
-
install_file
msedge.exe
-
pastebin_url
https://pastebin.com/raw/iTFsRfJn
-
telegram
https://api.telegram.org/bot6360505249:AAHDdvMVsfbwHsuJFlpL2LbAMh0zDVhDNu0/sendMessage?chat_id=6056246212
Targets
-
-
Target
img logger.hta
-
Size
998B
-
MD5
e9f8d2cbd98b827b2be314738d7a56dc
-
SHA1
bf603cda72ed3e93c6583a5df3900672d2f3b77a
-
SHA256
4beb6d6789d5780824d83f4920d21f7db21349573b11d8473879b44e6a101926
-
SHA512
27cdc567d63613b2f879583eabbd45f6f8bb9ba0af6976c47ba2fa7791e5c07dc9bdf628769f6b0f8face5f76175ad08a263507228a8aa10b3cf4eb572202023
-
Detect Xworm Payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-