General
-
Target
623547849.vbs
-
Size
210KB
-
Sample
240509-g5gfeaha86
-
MD5
86d5dcbeeeca8b8b5702e414678a95ee
-
SHA1
2bd15186a1120f5b222c3eeb6e56530b25bff151
-
SHA256
0d59e429f0d2acf46b9b2400651cae8ca032b62932bad8e39d7a1465ac49e36b
-
SHA512
e67238280029e78981495ee9f757a373a2588d47c4c55a248064535ae0bc75c3cc6900c811e10e1941478e0b40dfacac73573e9de0110a1163fdf23a678bb42f
-
SSDEEP
1536:ben2+mzXdn8l22d99CObidCocEW1aJK66n5yhtW0/5JpWn4cNIg0BfbUZlu9gISw:b2do9JK6X/vcmg0Bfc37P8
Static task
static1
Behavioral task
behavioral1
Sample
623547849.vbs
Resource
win7-20240220-en
Malware Config
Extracted
xworm
3.1
xmay8000.duckdns.org:8000
1xahivGykLCNnHwa
-
install_file
USB.exe
Targets
-
-
Target
623547849.vbs
-
Size
210KB
-
MD5
86d5dcbeeeca8b8b5702e414678a95ee
-
SHA1
2bd15186a1120f5b222c3eeb6e56530b25bff151
-
SHA256
0d59e429f0d2acf46b9b2400651cae8ca032b62932bad8e39d7a1465ac49e36b
-
SHA512
e67238280029e78981495ee9f757a373a2588d47c4c55a248064535ae0bc75c3cc6900c811e10e1941478e0b40dfacac73573e9de0110a1163fdf23a678bb42f
-
SSDEEP
1536:ben2+mzXdn8l22d99CObidCocEW1aJK66n5yhtW0/5JpWn4cNIg0BfbUZlu9gISw:b2do9JK6X/vcmg0Bfc37P8
-
Detect Xworm Payload
-
Detect ZGRat V1
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-