General
-
Target
zio.bat
-
Size
368KB
-
Sample
240609-wwhpfaeb33
-
MD5
1c17a6b4138408c4d9020d5f1facb603
-
SHA1
e907a2f443ad11e436fb22ca9890423b44c115db
-
SHA256
5a913d75f93cab55687c50a16281a906704224448eadce3f6b0f99e6cc2dbfdb
-
SHA512
78ba6eff9a50e003ace94e4ad7600222efea440c9d1085d4b84aad11b772017f2677584ce87df00c5c1a5794d8ec997b49906fbb4e28edb2e0ab6fb464c74463
-
SSDEEP
6144:nswmGBrnNbDhe3hO7UH+/KJStNN2dqY/b9dsRYfsTFU8NJHTRwLYnkbP:ndxfe3M5yMr2AC7UPJzRE1bP
Static task
static1
Malware Config
Extracted
xworm
5.0
looking-memphis.gl.at.ply.gg:45119
kWJg1zELhiwxHH2W
-
install_file
USB.exe
Targets
-
-
Target
zio.bat
-
Size
368KB
-
MD5
1c17a6b4138408c4d9020d5f1facb603
-
SHA1
e907a2f443ad11e436fb22ca9890423b44c115db
-
SHA256
5a913d75f93cab55687c50a16281a906704224448eadce3f6b0f99e6cc2dbfdb
-
SHA512
78ba6eff9a50e003ace94e4ad7600222efea440c9d1085d4b84aad11b772017f2677584ce87df00c5c1a5794d8ec997b49906fbb4e28edb2e0ab6fb464c74463
-
SSDEEP
6144:nswmGBrnNbDhe3hO7UH+/KJStNN2dqY/b9dsRYfsTFU8NJHTRwLYnkbP:ndxfe3M5yMr2AC7UPJzRE1bP
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-