General
-
Target
mine.hta
-
Size
48KB
-
Sample
240530-qjx1psba35
-
MD5
8ec81411709c0d3ca73859814204cd71
-
SHA1
7da6542e29c888d65a857cf5876ed8e9e6524510
-
SHA256
6840b6d84f7c7190424fd465e466e2477e7c8a781457e2c6dcd523df498cea3d
-
SHA512
ece006bb69841cf02d64c95c0534376934fa073b89eab8f85cc3323f647f1a326198d56cad9666d5b6152e763e2859e945e8794a877c75808f224b27201eec14
-
SSDEEP
768:SOLDbrv8XXl7qCk0BU6zoWvXqfM0JYJ4Tpdsfq0H5wj/:SObstqCdoWvXqfM0JY40Kj
Static task
static1
Behavioral task
behavioral1
Sample
mine.hta
Resource
win7-20240508-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:7001
134.255.233.93:7001
5loUYH5mEGReJgAG
-
install_file
USB.exe
Targets
-
-
Target
mine.hta
-
Size
48KB
-
MD5
8ec81411709c0d3ca73859814204cd71
-
SHA1
7da6542e29c888d65a857cf5876ed8e9e6524510
-
SHA256
6840b6d84f7c7190424fd465e466e2477e7c8a781457e2c6dcd523df498cea3d
-
SHA512
ece006bb69841cf02d64c95c0534376934fa073b89eab8f85cc3323f647f1a326198d56cad9666d5b6152e763e2859e945e8794a877c75808f224b27201eec14
-
SSDEEP
768:SOLDbrv8XXl7qCk0BU6zoWvXqfM0JYJ4Tpdsfq0H5wj/:SObstqCdoWvXqfM0JY40Kj
-
Detect Xworm Payload
-
StormKitty payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-