General
-
Target
34cba83c1407b0c89fccc26ed6845ed6df55ffc190e342969d05efec6fc8b74d.unknown
-
Size
312KB
-
Sample
240508-qe1k2aeb7z
-
MD5
e121a5222f3f7e3192f5fc35aff3413d
-
SHA1
7d364f37536ecb2883ce9c6cc7ed27d577942a3e
-
SHA256
34cba83c1407b0c89fccc26ed6845ed6df55ffc190e342969d05efec6fc8b74d
-
SHA512
538a7b57f0314fd23cce5eef9278f089124114e5eaca3acd02965e3329dcafed21852fae2684766228e6dfd4602f15e0ecab919481101c8585c3a3db4711a3d4
-
SSDEEP
192:HuhtA2ij4piUofM5lgNicP+nH88z0e5dsfvdelH6J7l6W:HEoj4IUT5lOP8H8vsdsAlaJ7kW
Static task
static1
Behavioral task
behavioral1
Sample
E422635314-receipt.vbs
Resource
win7-20240221-en
Malware Config
Extracted
xworm
3.1
xmay8000.duckdns.org:8000
1xahivGykLCNnHwa
-
install_file
USB.exe
Targets
-
-
Target
E422635314-receipt.vbs
-
Size
300.0MB
-
MD5
7bce723cfb539c1e6679602ea324d401
-
SHA1
814f0499c9d4458944b0c84f2aa8e4ce997a060e
-
SHA256
aa50e96354a516d7c876c188293eba327bd78cc9e41ddab34767efaafed9f54f
-
SHA512
24ca64a472b2ccec5bc7cdcfe476ba2168fa389a78ce8e3c030f33f23b6f7c2177adeef4d43a6c44eeee627754e1f9a5b161e9fce00ab13c3ce829ccf148241a
-
SSDEEP
768:7xHiHb008VOraIRgKb0tkvb03q9ZmR4Z:diJq1OZ
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-