General
-
Target
Paymentxx212093.vbs
-
Size
150KB
-
Sample
240608-splkzacg9w
-
MD5
4986a0bfa6ae968632439e36e76bba38
-
SHA1
e63b5c00a3dc1211252836437b87817a8ab270fb
-
SHA256
27133b9541228c135784f7c6c3bb9425975d7e7880ae278fea040b0ffcb8eee9
-
SHA512
346c1e13857bda390277152cb0bee0874f61acc06c34f666e26e7450a4d3f88aaab75a345a25bcaf9ca522e51e0a4ed774545f6ae625a803dabe8d7bf7604f09
-
SSDEEP
1536:jrUd99CObi/SXcfGdaJK6Uo6phGW0/5JJd0Pc1Ug0BjbUZlu9gISsRz:vUdqRJK6l/oc6g0Bjcc
Static task
static1
Behavioral task
behavioral1
Sample
Paymentxx212093.vbs
Resource
win7-20240221-en
Malware Config
Extracted
xworm
3.1
june9402xw.duckdns.org:9402
TAtfGa9f0WCjVzn6
-
install_file
USB.exe
Targets
-
-
Target
Paymentxx212093.vbs
-
Size
150KB
-
MD5
4986a0bfa6ae968632439e36e76bba38
-
SHA1
e63b5c00a3dc1211252836437b87817a8ab270fb
-
SHA256
27133b9541228c135784f7c6c3bb9425975d7e7880ae278fea040b0ffcb8eee9
-
SHA512
346c1e13857bda390277152cb0bee0874f61acc06c34f666e26e7450a4d3f88aaab75a345a25bcaf9ca522e51e0a4ed774545f6ae625a803dabe8d7bf7604f09
-
SSDEEP
1536:jrUd99CObi/SXcfGdaJK6Uo6phGW0/5JJd0Pc1Ug0BjbUZlu9gISsRz:vUdqRJK6l/oc6g0Bjcc
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-