General
-
Target
NOUVELLES PENALITES SUR LES DISA.zip
-
Size
219KB
-
Sample
240719-vfhttsvalf
-
MD5
3b39fac7cc2fec5f08802d4c3ec781ac
-
SHA1
2253a604b25edd64ec7df07594b9c78bac538002
-
SHA256
e9d5edd84989aa7cd3cb4add5d657f1ec8a19639d67d2ca43732184fe3791661
-
SHA512
8d2eb293aa3f2e011d73dc72ff56240f51aff9882ad8496b37a10ff19ca6b10b7740c57f7ddf269a8bc79168e082a318dcce1c3f75bc313c7400f3b3cf903878
-
SSDEEP
3072:x4DkF4LLe3rf1FM8c1wK6qTaDtubSPMnt1k/AbUeUhyOVC43BetyP3508BG2sBqF:r4ubtQiK6oaDtubVTk/AMg8BhsgUR0v
Static task
static1
Behavioral task
behavioral1
Sample
COURRIER DISA.zip.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
COURRIER DISA.zip.html
Resource
win10v2004-20240709-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat - Password:
159753Jp*
Extracted
xworm
5.0
yoda2024.sytes.net:43831
J4rIgEZp1s66p2yZ
-
install_file
USB.exe
Targets
-
-
Target
COURRIER DISA.zip.html
-
Size
216KB
-
MD5
c376c5c91c3f93ffb913cccbe09949e6
-
SHA1
4331d325bd138c96fe8c724e150ccf2d53f296c9
-
SHA256
2559caf1cc1e2fc03dcc6d87bf683a2f8f8e6c3b3f4ec65009dd09c5b15cd5a9
-
SHA512
bea51d67e36c2048ae918ccd6fe55a06bced1bf63543f333f6ad3d6d904abf55f8844582b776dd53861c8ec506f1265eb968c87a9c5ca2824f2673211812cfab
-
SSDEEP
6144:bKJ8Rd9k1aSYUr/VO295wjF50DVp7Rydcy7OGdZ:buc9ky6f9OrIvJ0OGb
Score10/10-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-