General
-
Target
7d9e874203b7c262e9adb12ca599b2732044c9fa4eba6649ebfd04f277977467
-
Size
447KB
-
Sample
240417-r8bdnsed2z
-
MD5
1bb973fc23f43fc74ecadded1ff9db07
-
SHA1
67c674239f1beaee1fd8c13ca5d57c8a58550242
-
SHA256
7d9e874203b7c262e9adb12ca599b2732044c9fa4eba6649ebfd04f277977467
-
SHA512
a4876e4f47e9222bf2ae557a51a607b62f4dd1f217484eeefec618840fb81115e5b162ce3cf26ab9f020c06e458e4a1b2439eb2eac2bf7fb670d62c62d64b73c
-
SSDEEP
12288:dMAwFLDj3ZYc6u89F3AIKW+c16TNtNee/SAZp7YdL:dMAwJDjpvL89F3vL6RtNehAZpY
Static task
static1
Behavioral task
behavioral1
Sample
33d4fd69c03968b472e3b5ec2fdf43db754aeed4366ae0111ac97fd394ef1e45.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33d4fd69c03968b472e3b5ec2fdf43db754aeed4366ae0111ac97fd394ef1e45.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
xworm
3.1
103.67.163.156:80
GR1Ja4STO1NfgM3m
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
33d4fd69c03968b472e3b5ec2fdf43db754aeed4366ae0111ac97fd394ef1e45.exe
-
Size
518KB
-
MD5
d3689c6f5e4336f5c79d3b5ef5588950
-
SHA1
2b4ec9a97aa03de5c00616b3d4f695377791155f
-
SHA256
33d4fd69c03968b472e3b5ec2fdf43db754aeed4366ae0111ac97fd394ef1e45
-
SHA512
0e6b81284abcbe26c821c6ee4f02f7a8933fc1704baa485ddd7a45786a4eb777ecef0df2bee924f1bdbbf70b7e7a88749bc8544109a51dd1ea3116977965af41
-
SSDEEP
12288:N+2iN/qHSkTkOMBKZ92HV1y4jiXLhT5vW:N+19qHSiZEKX
Score10/10-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-