Resubmissions
14-05-2024 11:22
240514-ngk71sdg28 1014-05-2024 11:22
240514-ngkw9add6y 1014-05-2024 11:22
240514-ngklgsdg27 1014-05-2024 11:22
240514-ngkaqadd6w 1014-05-2024 11:22
240514-ngjzysdd6v 1014-05-2024 11:22
240514-ngjn7add6t 1014-05-2024 11:22
240514-ngh3nadd6s 1014-05-2024 11:22
240514-ngh3nadg25 1014-05-2024 11:21
240514-nghrwsdd51 1014-05-2024 11:21
240514-ngg6csdd5z 10General
-
Target
kiddionsmodmenu.exe
-
Size
386KB
-
Sample
240514-ngh3nadg25
-
MD5
88e737816cc5f3e3809152c5f9dad5be
-
SHA1
56dedf42285c74795f714dbac7782a5d0e695a97
-
SHA256
6d09d43c755d5081924748104ac487afadaf68add75d85feb2a256de032a5e2c
-
SHA512
8d29b5606f91b953263738f03188a56a4c981a6213b53a830bd1e3975ff3d10274704df2dda957fa0b73cd8841947d6e850c6046338b8ebe9666ca895ce0eebd
-
SSDEEP
12288:hFPdfNMz0ECh63X3u+DnSmMk1B+8kxkpTD:hddFMz0EH3X39DnL3PHkxgn
Static task
static1
Behavioral task
behavioral1
Sample
kiddionsmodmenu.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
kiddionsmodmenu.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
kiddionsmodmenu.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
xworm
5.0
94.156.8.167:2020
8sPZSP21r8KwS1LM
-
install_file
USB.exe
Targets
-
-
Target
kiddionsmodmenu.exe
-
Size
386KB
-
MD5
88e737816cc5f3e3809152c5f9dad5be
-
SHA1
56dedf42285c74795f714dbac7782a5d0e695a97
-
SHA256
6d09d43c755d5081924748104ac487afadaf68add75d85feb2a256de032a5e2c
-
SHA512
8d29b5606f91b953263738f03188a56a4c981a6213b53a830bd1e3975ff3d10274704df2dda957fa0b73cd8841947d6e850c6046338b8ebe9666ca895ce0eebd
-
SSDEEP
12288:hFPdfNMz0ECh63X3u+DnSmMk1B+8kxkpTD:hddFMz0EH3X39DnL3PHkxgn
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-