General
-
Target
15052024_1514_14052024_S949757965.zip
-
Size
340KB
-
Sample
240515-smqrxafb4w
-
MD5
ecdbb7706a0796fe04f416c5ab13bee8
-
SHA1
158623cb23b471aa52af4502c6670b13996884d6
-
SHA256
9d28016366915abcb761788b5945736bc06d48a52d7f4199ebe3ad37fca7a5ca
-
SHA512
232373ef24003ca31b60b299256b2643a5e64c9aa6d98ebe9049723834e169a7409394b5db3e4b89c9d674863d403cb879b3e02bbd50f68d8df4fbb119ac35bc
-
SSDEEP
768:rFwV6iUxqGWjuGunAssIf9vzW8p1XObDltt3mcRkpAr/IAuWuqnqpxLvfe:rF95qGWjqASfN5p1ebDN2krAAu82zW
Static task
static1
Behavioral task
behavioral1
Sample
S949757965.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
S949757965.vbs
Resource
win10v2004-20240508-en
Malware Config
Extracted
xworm
3.1
xw9402may.duckdns.org:9402
xwormay9090.duckdns.org:9090
5w6Cp63r66k4Jxsj
-
install_file
USB.exe
Targets
-
-
Target
S949757965.vbs
-
Size
300.0MB
-
MD5
7d69463758d7daa176c7f0c2d7464b79
-
SHA1
529d7c798fa96e8c78aad637f772812a7d9f6e85
-
SHA256
28ea2a2652f1b206fa2c11b1f264fc3f0fdf60f45f21d3ba3ff9d50b7e118275
-
SHA512
e3cc81bdffe7245af8ef23b104c17259d05f08922cb1aa9b501e1da254451379bae244fef7e1e91f980c5552297f181fd03ddce76beb255df3f26172f3b4b6d4
-
SSDEEP
1536:zJF8FNK7mlIDCH6kN5cUh3Ooo7AhS+cYFQL4VrTflEiTGn:zM4CICHzXF3Oo/hSCegrrHGn
Score10/10-
Detect Xworm Payload
-
Detect ZGRat V1
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-