General
-
Target
AP Remittance - L - Ref S158578-1.bat
-
Size
37KB
-
Sample
240410-wc68pafc35
-
MD5
f40915eb2575e2403e865214aac2259e
-
SHA1
5f650e70eaa8e17789d6d0bb791a7632f313ff92
-
SHA256
0a5efcc3818622baf79ae660a24c0de5895410bf02eae8d6d913d8bcea9aa92e
-
SHA512
08ebc8cee5a54e27737ab218ba49785833d59be00650ec9f3184a8e19fe1a4ce3c30f6369ea05bb0fc674f43f98cf4bc0b26fbc1a3853acca5bebd5bbf576e5a
-
SSDEEP
768:qgvoJ5VJGvuBmOu0mGP4Vx9GCi3ALIKTxz5ok89pkZIT:qlJXJGvum6RPLCX7T1x+T
Static task
static1
Behavioral task
behavioral1
Sample
AP Remittance - L - Ref S158578-1.bat
Resource
win7-20240221-en
Malware Config
Extracted
xworm
5.0
77.83.255.40:7000
NW2hCIA3r5V1aiaw
-
install_file
USB.exe
Targets
-
-
Target
AP Remittance - L - Ref S158578-1.bat
-
Size
37KB
-
MD5
f40915eb2575e2403e865214aac2259e
-
SHA1
5f650e70eaa8e17789d6d0bb791a7632f313ff92
-
SHA256
0a5efcc3818622baf79ae660a24c0de5895410bf02eae8d6d913d8bcea9aa92e
-
SHA512
08ebc8cee5a54e27737ab218ba49785833d59be00650ec9f3184a8e19fe1a4ce3c30f6369ea05bb0fc674f43f98cf4bc0b26fbc1a3853acca5bebd5bbf576e5a
-
SSDEEP
768:qgvoJ5VJGvuBmOu0mGP4Vx9GCi3ALIKTxz5ok89pkZIT:qlJXJGvum6RPLCX7T1x+T
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-