General
-
Target
http://click.pstmrk.it/3s/click.pstmrk.it%2F3%2F38.62.245.50%252Fcontract_file.html%2FgCbE%2FOBG3AQ%2FAQ%2F52ae3b51-1704-40c9-94ec-de54b84f9c9c%2F1%2F3kREGiBepU/gCbE/ORG3AQ/AQ/561d52bd-bfd6-46f3-a583-e2bbfc1cd77a/1/Hsj5ltVh0u
-
Sample
240806-kjhywsydlf
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://click.pstmrk.it/3s/click.pstmrk.it%2F3%2F38.62.245.50%252Fcontract_file.html%2FgCbE%2FOBG3AQ%2FAQ%2F52ae3b51-1704-40c9-94ec-de54b84f9c9c%2F1%2F3kREGiBepU/gCbE/ORG3AQ/AQ/561d52bd-bfd6-46f3-a583-e2bbfc1cd77a/1/Hsj5ltVh0u
Resource
win11-20240802-en
Malware Config
Extracted
xworm
5.0
20.ip.gl.ply.gg:61413
21.ip.gl.ply.gg:30704
IJ1arWifhZJOz3Zf
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6584279699:AAEqagLrmPUC21iKUr3le2L8nbZJK6ktSFM/sendMessage?chat_id=5479981438
Extracted
gurcu
https://api.telegram.org/bot6584279699:AAEqagLrmPUC21iKUr3le2L8nbZJK6ktSFM/sendMessage?chat_id=5479981438
Targets
-
-
Target
http://click.pstmrk.it/3s/click.pstmrk.it%2F3%2F38.62.245.50%252Fcontract_file.html%2FgCbE%2FOBG3AQ%2FAQ%2F52ae3b51-1704-40c9-94ec-de54b84f9c9c%2F1%2F3kREGiBepU/gCbE/ORG3AQ/AQ/561d52bd-bfd6-46f3-a583-e2bbfc1cd77a/1/Hsj5ltVh0u
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-