General
-
Target
PM-DETAILS-STQRT5RX-102024.zip
-
Size
10KB
-
Sample
241031-srrj1a1ana
-
MD5
3fab295ba12afc0e54bd7c627995a6b4
-
SHA1
790fd7a0920e8bbee16d2ee9071a7e7224943900
-
SHA256
59ce094776dc5fd92d69b3563377768dc9c00a9db405578c0e02ee429db9f684
-
SHA512
fd0766f28e3ea81f55ab7710285942c9e9dc8488044714896c009ba259fd6b9053f19d17a267e46db1b541e6d181f123e4838f20c50a1ea087aa31d2704e00ee
-
SSDEEP
192:MU3X/sVK+BvVGKxqttcV2alIETYIEAptGLFvBy7:MgX/sVzRAaleHG0L9E
Static task
static1
Behavioral task
behavioral1
Sample
PM-DETAILS-STQRT5RX-102024.pdf.js
Resource
win7-20240708-en
Malware Config
Extracted
http://85.209.11.15/q/9.png
Extracted
http://85.209.11.15/q/45.png
Extracted
xworm
85.209.11.15:4404
-
install_file
USB.exe
Targets
-
-
Target
PM-DETAILS-STQRT5RX-102024.pdf.txt
-
Size
584KB
-
MD5
5513c9002d741f622e82e61505c8255a
-
SHA1
c3d1b2fe4e9d382e448261dc4fcbca1c17859a17
-
SHA256
a7db6879ea9bb70d8d8d9c22e620fc69187d0fa226e7eb6f89ee6fc226433352
-
SHA512
a61f6cda41cd38c904ef1c9ce2365a0c82b10673523db6d9bf2ab89ace088a6c80f859edf9e1136cd6929f050ace025650fba0e80eadaa4d281909f830a674dd
-
SSDEEP
1536:7E+E+EBE0E3E0EjEDE0EdE0EBE0x0EgE9EdE+E+EBE0E3E0E0E0E0E0E0EBE0E0n:YFyN
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-