General
-
Target
Your_New_Social_Security_Statement.wsf
-
Size
5KB
-
Sample
240807-qr7j4sseqa
-
MD5
3b566e8ed4838f476d7dda08a9acc1b1
-
SHA1
a426b95ac0992dda56fa15c52a2765101df19aee
-
SHA256
fd7d4ec1d86c01b1f234b333941e7615fae1dd342fb2ec80a4e78a5cc5fb5a42
-
SHA512
96a460d11d28f1f3ad545b646e1b015264cd4a86aa017a6c015a52a09d5638c09439668fb397427cd24d67de062c712010f24fc82bf9b18555c9d19f2b3e5f68
-
SSDEEP
96:TkWXrHfYiu03P/hyUMl2N6SmxV3xzjpeX0T2MNdP+lHjfmMmpR0RQVWN:o0rTuI3HM06SifzjpeEjdwQoN
Static task
static1
Behavioral task
behavioral1
Sample
Your_New_Social_Security_Statement.wsf
Resource
win7-20240705-en
Malware Config
Extracted
Protocol: ftp- Host:
142.44.252.6 - Port:
21 - Username:
dp - Password:
pp...123456
Extracted
xworm
5.0
OMRAN2024.WORK.GD:7001
l4UtihZj05q6W7mB
-
install_file
USB.exe
Targets
-
-
Target
Your_New_Social_Security_Statement.wsf
-
Size
5KB
-
MD5
3b566e8ed4838f476d7dda08a9acc1b1
-
SHA1
a426b95ac0992dda56fa15c52a2765101df19aee
-
SHA256
fd7d4ec1d86c01b1f234b333941e7615fae1dd342fb2ec80a4e78a5cc5fb5a42
-
SHA512
96a460d11d28f1f3ad545b646e1b015264cd4a86aa017a6c015a52a09d5638c09439668fb397427cd24d67de062c712010f24fc82bf9b18555c9d19f2b3e5f68
-
SSDEEP
96:TkWXrHfYiu03P/hyUMl2N6SmxV3xzjpeX0T2MNdP+lHjfmMmpR0RQVWN:o0rTuI3HM06SifzjpeEjdwQoN
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-