General
-
Target
586f84f00057a75fbfd0f4db886702e67de05d30a17f1ab576c4ee07fbdb73fd.ps1
-
Size
326KB
-
Sample
240925-b9ngma1bld
-
MD5
27d20bdda6494c73a24bae16d3568c1d
-
SHA1
77ba6a6c44fdd920579f91a5ee37bfa2c7d494a0
-
SHA256
586f84f00057a75fbfd0f4db886702e67de05d30a17f1ab576c4ee07fbdb73fd
-
SHA512
f1d954fe930890e74874eff35ac217cca2274a7ce693522724dc74b38bcb6810f5fad91023843d489ba6ad83a8aedc2e0020ec964449f73ca662a6f2c24e0608
-
SSDEEP
3072:16CA55HWty5Hh4LhC8D60U4h3mSuoTUfWwLC5ImBK5W9Fp81fABAUvetcTnZj:sV5H1Hh4LhC8zTUOwqYyfbZ
Static task
static1
Behavioral task
behavioral1
Sample
586f84f00057a75fbfd0f4db886702e67de05d30a17f1ab576c4ee07fbdb73fd.ps1
Resource
win7-20240729-en
Malware Config
Extracted
xworm
5.0
wireoff.work.gd:7000
M1ckbLXGiMXwWvIS
-
install_file
USB.exe
Targets
-
-
Target
586f84f00057a75fbfd0f4db886702e67de05d30a17f1ab576c4ee07fbdb73fd.ps1
-
Size
326KB
-
MD5
27d20bdda6494c73a24bae16d3568c1d
-
SHA1
77ba6a6c44fdd920579f91a5ee37bfa2c7d494a0
-
SHA256
586f84f00057a75fbfd0f4db886702e67de05d30a17f1ab576c4ee07fbdb73fd
-
SHA512
f1d954fe930890e74874eff35ac217cca2274a7ce693522724dc74b38bcb6810f5fad91023843d489ba6ad83a8aedc2e0020ec964449f73ca662a6f2c24e0608
-
SSDEEP
3072:16CA55HWty5Hh4LhC8D60U4h3mSuoTUfWwLC5ImBK5W9Fp81fABAUvetcTnZj:sV5H1Hh4LhC8zTUOwqYyfbZ
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-