General
-
Target
c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04.vbs
-
Size
4KB
-
Sample
240406-bz74aahb95
-
MD5
22d736ac0bfacea4d23dbaf9412d329a
-
SHA1
b2990e0c9f9549b1f8cc3dceec47663b975cbb36
-
SHA256
c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04
-
SHA512
bfdd54f8e400e9c516cf5c73f1ba17b2a5c44fe9d14ada37efaff35c38d30c7849ad1dfb32a3d877742631a60c462832e079994de5fe65044a2941eaa0770904
-
SSDEEP
96:LQUUjcFSoSqUnPkPKOTK6yjbo+yHQUJ8fLGZ2k7:dYcFh5UsPKOTJcoLMw2k7
Static task
static1
Behavioral task
behavioral1
Sample
c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04.vbs
Resource
win7-20240221-en
Malware Config
Extracted
xworm
5.0
UxOlPOZZNwNV9srk
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/Dh8E7H3R
Targets
-
-
Target
c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04.vbs
-
Size
4KB
-
MD5
22d736ac0bfacea4d23dbaf9412d329a
-
SHA1
b2990e0c9f9549b1f8cc3dceec47663b975cbb36
-
SHA256
c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04
-
SHA512
bfdd54f8e400e9c516cf5c73f1ba17b2a5c44fe9d14ada37efaff35c38d30c7849ad1dfb32a3d877742631a60c462832e079994de5fe65044a2941eaa0770904
-
SSDEEP
96:LQUUjcFSoSqUnPkPKOTK6yjbo+yHQUJ8fLGZ2k7:dYcFh5UsPKOTJcoLMw2k7
-
Detect Xworm Payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-