General
-
Target
order_receipt#277.vbs
-
Size
138KB
-
Sample
241029-xw995axkf1
-
MD5
e845c7177b3fbef4bacea00df938bc28
-
SHA1
af8f1912ee1d5e2daa119d52537fc09a8316aa4d
-
SHA256
9eb00c37db0331a7a0ef2056bda5ffe8fde8d812f4d3f8b54f278ba041cfd2a0
-
SHA512
85c0b69a7f3b615b0796f882620d40c4bc5b8f79b3adffc11cee3b08085879f55c78c81a65671c2701139d4c68c39b27178730241be00a0054c37809936b0043
-
SSDEEP
1536:Qyb8Rgt5pzGGwEM9cW/9WoOv5xvX7Nvx48bOAobVHL3x:QybOgt5pCGwEM/FWXvnLNvxrbO3bVr3x
Static task
static1
Behavioral task
behavioral1
Sample
order_receipt#277.vbs
Resource
win7-20240903-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Extracted
xworm
5.0
aq3Fac3Pq9GHgZuk
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/juxAi7cy
Targets
-
-
Target
order_receipt#277.vbs
-
Size
138KB
-
MD5
e845c7177b3fbef4bacea00df938bc28
-
SHA1
af8f1912ee1d5e2daa119d52537fc09a8316aa4d
-
SHA256
9eb00c37db0331a7a0ef2056bda5ffe8fde8d812f4d3f8b54f278ba041cfd2a0
-
SHA512
85c0b69a7f3b615b0796f882620d40c4bc5b8f79b3adffc11cee3b08085879f55c78c81a65671c2701139d4c68c39b27178730241be00a0054c37809936b0043
-
SSDEEP
1536:Qyb8Rgt5pzGGwEM9cW/9WoOv5xvX7Nvx48bOAobVHL3x:QybOgt5pCGwEM/FWXvnLNvxrbO3bVr3x
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-