General
-
Target
HG7dj4_Receipt.zip
-
Size
61KB
-
Sample
241026-netrdatdnc
-
MD5
c71b34977c0ffd303ccff1c66326b2b9
-
SHA1
e40134cef129a4bd31504866bd691663d7dc3d26
-
SHA256
5acd33e1e58647897cd7897305eec80d6c9228ec2fce8f972825b48ea16a8c74
-
SHA512
157efa4e5d8247cd961cefa35b0740286ec5f2e92bf6d02f7c258537cf84466f0683a13c05e6a447667c2c9b8b4f2901869a6f31f139e59951caf174029cb519
-
SSDEEP
1536:51qD5viGMHovnCKBr9O8ohhECn9RX3U0U/M5eu2AGIve5oW:51wv3+CnTgsCn9pkZE5eiGa8
Static task
static1
Behavioral task
behavioral1
Sample
c56D7_Receipt.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c56D7_Receipt.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.1
xwor3july.duckdns.org:9402
JIs7HXfvmVwG8wtR
-
install_file
USB.exe
Targets
-
-
Target
c56D7_Receipt.vbs
-
Size
130KB
-
MD5
878ba89eaad87f86c7ff4e5fee1e1823
-
SHA1
8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b
-
SHA256
30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15
-
SHA512
2ed93d10566fcd7bc312a321a4551611c08dc1de817cf89c5a46be1d8243b77a075896658dd92d5de9d66d7a5bed92b51d25e0729f06369ba673a12b1a37bc7b
-
SSDEEP
3072:ZxQCCYVaCCq+c0C49NixM8B20HcO4uuxQCCYVaCCq+c0C49NixM8B20HcO4uA:Z2CCYsfq+cp49oa8B208Mu2CCYsfq+cm
-
Detect Xworm Payload
-
Guloader family
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-