General
-
Target
4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2.unknown
-
Size
689KB
-
Sample
240924-j2vvqsxakq
-
MD5
0db817d8d07638cd81adee6852de57f7
-
SHA1
ca6589dcd6d33e3cc5f65d492b81ae376606d9dd
-
SHA256
4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2
-
SHA512
e4d57643aa231040a079f35c9c8365dab6291f76a1ff6f28db373d7d664f2aae240c85a585aa1908bd744176e7e437d5bd9c0e78c22f7f48de12bacb159befc8
-
SSDEEP
1536:VPPPPPPPPPPPPPPPPPPPPPPPE77777777777777777777777777777777777777Y:rnRC7pT0FT2w
Static task
static1
Behavioral task
behavioral1
Sample
4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Extracted
Protocol: ftp- Host:
ftp.desckvbrat.com.br - Port:
21 - Username:
desckvbrat1 - Password:
developerpro21578Jp@@
Extracted
xworm
5.0
dianganadores.duckdns.org:7080
:7080
qGs2m5ptuM4htdW5
-
install_file
USB.exe
Targets
-
-
Target
4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2.unknown
-
Size
689KB
-
MD5
0db817d8d07638cd81adee6852de57f7
-
SHA1
ca6589dcd6d33e3cc5f65d492b81ae376606d9dd
-
SHA256
4f0190aabf763b79ab3f5649b12cc5bf3c545b2e7047f6befca7638918123fe2
-
SHA512
e4d57643aa231040a079f35c9c8365dab6291f76a1ff6f28db373d7d664f2aae240c85a585aa1908bd744176e7e437d5bd9c0e78c22f7f48de12bacb159befc8
-
SSDEEP
1536:VPPPPPPPPPPPPPPPPPPPPPPPE77777777777777777777777777777777777777Y:rnRC7pT0FT2w
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-