General
-
Target
Guestlist.zip
-
Size
171KB
-
Sample
240703-yr1essxcnd
-
MD5
7568a078b734da1f410235adf32cdb69
-
SHA1
3a462d95d7c217d54799b7ece6528991c3625d04
-
SHA256
09ebaac81c2816aae61095e019924152b15c1504b0f2f6b512c4230b72268bf8
-
SHA512
7cd8db1d53a6e6b572c9f68db59650d9e46553ce11fead9d7e0c150b7412220c0e7c5160cc8f8bc6782bac36a142f153ecbf97ec178e343e21532920d70d132d
-
SSDEEP
3072:m1KFUvq5NYyn87J2lXX+QQ7CGxihjrn5boZnHz90hQvF8URBHO8Ki8up:tUyHJn8l2leuKofnMHlJRBHO8K5up
Static task
static1
Behavioral task
behavioral1
Sample
wild2.bat
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
wild2.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
wild2.vbs
Resource
win7-20240508-en
Malware Config
Extracted
xworm
142.202.242.177:7000
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7086125226:AAHBCPyJPzMk3klDDrNR7WI_pR8VgcrX-rg/sendMessage?chat_id=5009918391
Extracted
gurcu
https://api.telegram.org/bot7086125226:AAHBCPyJPzMk3klDDrNR7WI_pR8VgcrX-rg/sendMessage?chat_id=5009918391
Targets
-
-
Target
wild2.bat
-
Size
101KB
-
MD5
1b0db010a5478b1bd34e62d563490b57
-
SHA1
8d138974f30d83f9f1dfd7ffb89c830b290dc647
-
SHA256
6e10dd12715347b79ddc3aaaa30be9b00548cf54f7b515e66e78f995b6412162
-
SHA512
a081a9ae668b2f9389d8b5648a9bc218cb6e8002d76955307104324b66fc22cfda501a8c6e69b3f87fe582fee8ab6feb8bac365412852708c91cd6673621db8f
-
SSDEEP
3072:8fmmAtb3zUdrhco3sgrDIt+YaNQsEerlw5i:Cmm6DUdqo8grMt+YKPt
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
-
-
Target
wild2.vbs
-
Size
136KB
-
MD5
2fc8fa386eac2b756ca56d6c5ea5972a
-
SHA1
5e8701a6f9ff44f141f14e43a6b612b82b23aeb1
-
SHA256
e28bdb40c41bbadef5a3413c02773f291db42e0523c7aa6d4f93a03b3aa7959a
-
SHA512
531876ffe3a10729b60dbb45161bb6e73e14be00d174aedb0afcc4689c57e9f8b5cc147eefb25f002f62540c0748c0fb183bea3d90f525a7f688bf8ef3c9894a
-
SSDEEP
3072:UUtmc9S9K7G4yC0oab3a1adGNRLfE28rHRq8QDEQ0SkhbPxFIWW:UUwT4ygabaEGNRHkHDQDD0NRW
-
Detect Xworm Payload
-
StormKitty payload
-
Blocklisted process makes network request
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-