General
-
Target
6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.zip
-
Size
432KB
-
Sample
240415-wspctach39
-
MD5
43b67d0071ac82195e5daa02a115774e
-
SHA1
436abe83e045c1731a556b64813555196a385e41
-
SHA256
a5fc75ed69ef7cf908b297fe98806a881d014dfa075cf05fc8ac0792c8fa3b59
-
SHA512
d4aa8673513c4ba7d1c214d8b03fd976fd0c28512286968ce95d69b81cf1a0656c7aec1356435bacf0d498e610c03ba1a710605d2d9a77c05097a6c7f1b4c496
-
SSDEEP
12288:mWk+6ZPauB8FyEWG/5/CX49FW3fxUJRjRT237CA:eRPVBCyZG/5KocfxUJRjZen
Static task
static1
Behavioral task
behavioral1
Sample
6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
104.250.180.178:7061
-
Install_directory
%AppData%
-
install_file
XClient.exe
Targets
-
-
Target
6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338.exe
-
Size
445KB
-
MD5
40e7f9319d64559c2bc3ab6595f419f3
-
SHA1
4f5da8030b4dcc5774d7e8bd967614e77510dfb1
-
SHA256
6dd41bfc65feff17a243f97340729b3472f519c1029127c5e9fee03bafcde338
-
SHA512
bd35b27bf7b59d86d7d5eed1854d9b365decb4a56f60eb53364dc9c65a0cd3350b67b6b4580a64f231166267d987aa0654ed043f0ce97e94d1bd8015a03187c5
-
SSDEEP
12288:hkvq31eoWDu5ysKCxGSY1gMGYkR2mf62q4KkrkDFAdq:heqFCu5VKsm1gMGYHmiWkDFAY
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-