General
-
Target
31599bbf15939b4fbc91a6e228b436abfef3a213ece4d92cc6d8c90c905528ad.exe
-
Size
2.1MB
-
Sample
241009-brkb9ayakn
-
MD5
8c04e5d5adaf15173fecd9384ceda14d
-
SHA1
9cbcf5134cfecb1a1f0c7e615a2a973ed8381e54
-
SHA256
31599bbf15939b4fbc91a6e228b436abfef3a213ece4d92cc6d8c90c905528ad
-
SHA512
7616ce8a0728abedb084c516b47fe45b7af264458d9fa4edccebbd2f8e77fbc17a703f06e8e23b9c618a45176a6073f6a5b0727619adf30f620eac062d58c0fe
-
SSDEEP
24576:X40Bg3buy6rMn3I5bF2Wlo7XGc6okgFZ5A1WqJlLsYpd+wyQn652pBJTu:DCruyinbFOR6PgFZmMqJ19pd+wpXa
Static task
static1
Behavioral task
behavioral1
Sample
31599bbf15939b4fbc91a6e228b436abfef3a213ece4d92cc6d8c90c905528ad.exe
Resource
win7-20240708-en
Malware Config
Extracted
https://ia600101.us.archive.org/1/items/detah-note-j_202410/DetahNote_J.jpg%20
https://ia600101.us.archive.org/1/items/detah-note-j_202410/DetahNote_J.jpg%20
Extracted
https://ia600101.us.archive.org/1/items/detah-note-j_202410/DetahNote_J.jpg%20
https://ia600101.us.archive.org/1/items/detah-note-j_202410/DetahNote_J.jpg%20
Extracted
xworm
5.0
172.214.220.82:5555
XjG17XjAty4BSeG3
-
Install_directory
%LocalAppData%
-
install_file
sys32.exe
-
telegram
https://api.telegram.org/bot7375017271:AAEAqNiylxrFjGgvlGU0if1BBlKDJQLHYkw
Extracted
gurcu
https://api.telegram.org/bot7375017271:AAEAqNiylxrFjGgvlGU0if1BBlKDJQLHYkw/sendMessage?chat_id=-4592360412
Targets
-
-
Target
31599bbf15939b4fbc91a6e228b436abfef3a213ece4d92cc6d8c90c905528ad.exe
-
Size
2.1MB
-
MD5
8c04e5d5adaf15173fecd9384ceda14d
-
SHA1
9cbcf5134cfecb1a1f0c7e615a2a973ed8381e54
-
SHA256
31599bbf15939b4fbc91a6e228b436abfef3a213ece4d92cc6d8c90c905528ad
-
SHA512
7616ce8a0728abedb084c516b47fe45b7af264458d9fa4edccebbd2f8e77fbc17a703f06e8e23b9c618a45176a6073f6a5b0727619adf30f620eac062d58c0fe
-
SSDEEP
24576:X40Bg3buy6rMn3I5bF2Wlo7XGc6okgFZ5A1WqJlLsYpd+wyQn652pBJTu:DCruyinbFOR6PgFZmMqJ19pd+wpXa
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1