General

  • Target

    nZUHcRav9ZMb38xbORpZwfcSyJYcoRNGQyALUnVr.zip

  • Size

    538KB

  • MD5

    a98620d631027960f016e3e243340228

  • SHA1

    ec8a6cf0926d05ef4aeb71eac7fb5aedf68211f3

  • SHA256

    25065c211e05d389663fc109ba4a6a2d1b87eaf5de07a6fca4d7de1cfb3ae5a2

  • SHA512

    c513daac5c8a6e4c91989290502d511045e45b8a3a24284d2eb961468149629a68fa4b85770b96ab816e12a02c2d4ec7425fb48e8ce8664a66b0902785cacc88

  • SSDEEP

    12288:wogNRCQ0wbQDG8kjVy9KhxHu7G6h4AbKuZYWRi4VHhSR:QNRKVkMUTHu7puWRZVBSR

Score
10/10

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    NVIDIAFrameview.exe

  • pastebin_url

    https://pastebin.com/raw/UWpQULMP

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • nZUHcRav9ZMb38xbORpZwfcSyJYcoRNGQyALUnVr.zip
    .zip
  • Ro-exec/Defender_Settings.vbs
    .vbs
  • Ro-exec/READ ME (ro-exec).txt
  • Ro-exec/dControl.ini
  • Ro-exec/defcon.exe
    .exe windows:5 windows x86 arch:x86


    Code Sign

    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • Ro-exec/ezdebug.png
    .png
  • Ro-exec/loader.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections