General
-
Target
9c1a4e3a1c90d013a9465ab585ad7a9cfc378ebdbe77fc1548cb81c791e6914e.bat
-
Size
152KB
-
Sample
240514-m8f7psda5s
-
MD5
0b426e8571f8d3e437b7a42e9b8fd808
-
SHA1
986edba4c39be9edb552284dac555e2e95f68a4a
-
SHA256
9c1a4e3a1c90d013a9465ab585ad7a9cfc378ebdbe77fc1548cb81c791e6914e
-
SHA512
e2efb8ba96b4c11b6167f085d5545e7e4971850e3c57f76957b8a0b0e1896537d935d123de93c1ebfd3efab34139e9bf902911ba54f20ddffad21edeeb16b021
-
SSDEEP
3072:TXHtlYzFn8xKlZqwe64MpN9Q2cLNt0hcjhK7ZmVG/:rUB8gQMpvQ2Er0aG/
Static task
static1
Behavioral task
behavioral1
Sample
9c1a4e3a1c90d013a9465ab585ad7a9cfc378ebdbe77fc1548cb81c791e6914e.bat
Resource
win7-20240508-en
Malware Config
Extracted
xworm
5.0
94.156.8.167:2020
8sPZSP21r8KwS1LM
-
install_file
USB.exe
Targets
-
-
Target
9c1a4e3a1c90d013a9465ab585ad7a9cfc378ebdbe77fc1548cb81c791e6914e.bat
-
Size
152KB
-
MD5
0b426e8571f8d3e437b7a42e9b8fd808
-
SHA1
986edba4c39be9edb552284dac555e2e95f68a4a
-
SHA256
9c1a4e3a1c90d013a9465ab585ad7a9cfc378ebdbe77fc1548cb81c791e6914e
-
SHA512
e2efb8ba96b4c11b6167f085d5545e7e4971850e3c57f76957b8a0b0e1896537d935d123de93c1ebfd3efab34139e9bf902911ba54f20ddffad21edeeb16b021
-
SSDEEP
3072:TXHtlYzFn8xKlZqwe64MpN9Q2cLNt0hcjhK7ZmVG/:rUB8gQMpvQ2Er0aG/
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-