General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://firebasestorage.googleapis.com/v0/b/rodriakd-8413d.appspot.com/o/dll%2Fdll%20Hope.txt?alt=media&token=61c829f6-e196-49e8-b4ff-041134577ffe
Extracted
Family
xworm
Version
5.0
C2
BobbyMiller09.bumbleshrimp.com:1978
Mutex
nVTUMK4KGE9DKP3U
Attributes
-
Install_directory
%Temp%
-
install_file
XClient.exe
aes.plain
Targets
-
-
Target
https://drive.google.com/file/d/1ujWZUijtSNleX-CVAmIFu_mP1gIYi4My/view?usp=drive_web
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-