General
-
Target
2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7
-
Size
3KB
-
Sample
240925-jvmksatfnl
-
MD5
e4895b941c8ea6d76630d6fcb2002292
-
SHA1
9e3038c82fd6767bfa224f361400fc89cd8d0d89
-
SHA256
2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7
-
SHA512
22c79a4fec72693f34933c1845c2225ba33cc9c11dd320a819e1c397dfa2ecc92ad752302fe161f247fd217cc30ec28a2959126a24a95269191dbe1fc473ea76
Static task
static1
Behavioral task
behavioral1
Sample
2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7.wsf
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
ALBANIAH3CKER.WORK.GD:7000
IFhL8Is8edtDA6ZA
-
install_file
USB.exe
Targets
-
-
Target
2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7
-
Size
3KB
-
MD5
e4895b941c8ea6d76630d6fcb2002292
-
SHA1
9e3038c82fd6767bfa224f361400fc89cd8d0d89
-
SHA256
2e63fec5163d85af2caf87e31459a0d6cca4cdb3d65a797e00a62b0c2b76acd7
-
SHA512
22c79a4fec72693f34933c1845c2225ba33cc9c11dd320a819e1c397dfa2ecc92ad752302fe161f247fd217cc30ec28a2959126a24a95269191dbe1fc473ea76
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-