General
-
Target
ORDER-24930-067548.tar
-
Size
728B
-
Sample
241002-p1sa4swhjn
-
MD5
d69efcae7b8c84891f2a97704056d359
-
SHA1
61ea98957f4f58f99eac93dd1ba6eb6167bf1b14
-
SHA256
2d11b150e60197726edad9fc6b6b9c1c4f4aad396ddcb0fed1f3fd85d585345b
-
SHA512
2a046513f9bcfd53b7479433a51624ac2aa8c152898d36eda78d87b4a9c7569b3e0674e7d88be4c908f9b4f1d7bd972af9fa4266fead6c4ed95838740e06084b
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-24930-067548.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ORDER-24930-067548.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
as525795.duckdns.org:6980
194.37.97.150:6980
wtYmVE2WY2XGhWlO
-
install_file
adobe.exe
Targets
-
-
Target
ORDER-24930-067548.js
-
Size
7KB
-
MD5
8fbf57ab035ec7063b9522e5f30a75f7
-
SHA1
cd761463221ba82f46b2b28fe56a0e74588c64b9
-
SHA256
ff84d777db298c70e206a94f1a4a1a5d5536d8cd42eedbd50ffde364daa368a6
-
SHA512
6fb68c7241c130973c1332a2f1c23c76cdb4640d76e270e1a0538a83001fe7d2aa4397ccb34def80ce88a5050f36d7bbaad7700fd9efa666c26bb0e6c4bc71d6
-
SSDEEP
96:lUu0CRu5u37arzWruLprCRuzrN+uQ6rgxX4murNdgCRufZQL76mXHNuipdWwp5i6:lUycqnDtjfQxaWpK+l
-
Detect Xworm Payload
-
StormKitty payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1