General
-
Target
28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f.vbs
-
Size
2KB
-
Sample
240213-c41ensda38
-
MD5
1f0f7a4d9adacc6d3b6fb93bfe05f28e
-
SHA1
ea643e625a401b7f7dd3d93dcd3eb414e71f5866
-
SHA256
28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f
-
SHA512
dc8ff31f758f80cc734b84b0e575cc1f77871e0cd89faf5dd194371c0fdc6dbc70b04a7dfb7149a25f83d583ad3f845ab6a1f3f0715069c6c2dfa0e0841395b9
Static task
static1
Behavioral task
behavioral1
Sample
28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f.vbs
Resource
win10v2004-20231215-en
Malware Config
Extracted
xworm
3.1
xwv5group7001.duckdns.org:7001
mrkh245537gVoEKF
-
install_file
USB.exe
Targets
-
-
Target
28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f.vbs
-
Size
2KB
-
MD5
1f0f7a4d9adacc6d3b6fb93bfe05f28e
-
SHA1
ea643e625a401b7f7dd3d93dcd3eb414e71f5866
-
SHA256
28c020b8cb635d2578b6a0287f9fb077d9156c5d1ae4c5edfff2b0f2a9d7af4f
-
SHA512
dc8ff31f758f80cc734b84b0e575cc1f77871e0cd89faf5dd194371c0fdc6dbc70b04a7dfb7149a25f83d583ad3f845ab6a1f3f0715069c6c2dfa0e0841395b9
Score10/10-
Detect Xworm Payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-