General
-
Target
z2PO20240815.pdf.lnk
-
Size
3KB
-
Sample
240819-p5r6xavepa
-
MD5
c4faf5e376bc049a2e22dca8f31e0382
-
SHA1
5a4b2a74e6c948e603e71df075cdb84e37a9798c
-
SHA256
c1ac6640bb74438f7a6c430ab4c701f7daf2117b87522f9bb4b8da6fdca1b375
-
SHA512
ba9bec097690386b7201f78924e11e15d49de103fcd653fd96ec3eafb82a9e8ef0bb246a5b58d57a81d71ab9a30bff8cef5d7afbe703c01016b67a7bcbd98b1e
Static task
static1
Behavioral task
behavioral1
Sample
z2PO20240815.pdf.lnk
Resource
win7-20240705-en
Malware Config
Extracted
xworm
5.0
xwram1.duckdns.org:58345
iEuKzrF7KOcf8iUC
-
install_file
USB.exe
Targets
-
-
Target
z2PO20240815.pdf.lnk
-
Size
3KB
-
MD5
c4faf5e376bc049a2e22dca8f31e0382
-
SHA1
5a4b2a74e6c948e603e71df075cdb84e37a9798c
-
SHA256
c1ac6640bb74438f7a6c430ab4c701f7daf2117b87522f9bb4b8da6fdca1b375
-
SHA512
ba9bec097690386b7201f78924e11e15d49de103fcd653fd96ec3eafb82a9e8ef0bb246a5b58d57a81d71ab9a30bff8cef5d7afbe703c01016b67a7bcbd98b1e
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-