General
-
Target
30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15.vbs
-
Size
130KB
-
Sample
241027-lgskzsxcmp
-
MD5
878ba89eaad87f86c7ff4e5fee1e1823
-
SHA1
8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b
-
SHA256
30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15
-
SHA512
2ed93d10566fcd7bc312a321a4551611c08dc1de817cf89c5a46be1d8243b77a075896658dd92d5de9d66d7a5bed92b51d25e0729f06369ba673a12b1a37bc7b
-
SSDEEP
3072:ZxQCCYVaCCq+c0C49NixM8B20HcO4uuxQCCYVaCCq+c0C49NixM8B20HcO4uA:Z2CCYsfq+cp49oa8B208Mu2CCYsfq+cm
Static task
static1
Behavioral task
behavioral1
Sample
30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.1
xwor3july.duckdns.org:9402
JIs7HXfvmVwG8wtR
-
install_file
USB.exe
Targets
-
-
Target
30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15.vbs
-
Size
130KB
-
MD5
878ba89eaad87f86c7ff4e5fee1e1823
-
SHA1
8f9496d5da92c9a0f64ffe5aa0ee0da259a9da1b
-
SHA256
30c4d81a0075e27984f768fa73c43240f5b14724a84a5057c15c99114b4aac15
-
SHA512
2ed93d10566fcd7bc312a321a4551611c08dc1de817cf89c5a46be1d8243b77a075896658dd92d5de9d66d7a5bed92b51d25e0729f06369ba673a12b1a37bc7b
-
SSDEEP
3072:ZxQCCYVaCCq+c0C49NixM8B20HcO4uuxQCCYVaCCq+c0C49NixM8B20HcO4uA:Z2CCYsfq+cp49oa8B208Mu2CCYsfq+cm
-
Detect Xworm Payload
-
Guloader family
-
Xworm family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-