General
-
Target
DeadPayload.exe
-
Size
500KB
-
Sample
241031-xnjr7s1jbz
-
MD5
4dbebfa079ea4b45eb94e2843180c56b
-
SHA1
820487493a6845752041ca9e0f714025c9eda4bc
-
SHA256
a17456d92d96f3fa579828f04e0530bf650eb92baf68bc414f101f6656c01cda
-
SHA512
b347ac5f39440fad010c8c8e715fb293967ae08b43cf246ea09b328b00a4f35ea6a251e432ad6c26901fb5db8936c57f370df321ae86cb8180e5aee2de57574b
-
SSDEEP
12288:N3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sdN:dkGTy
Static task
static1
Malware Config
Extracted
xworm
5.0
QgVg78qW15uIsQ4H
-
Install_directory
%Public%
-
install_file
ohh.exe
-
pastebin_url
https://pastebin.com/raw/J09JweeH
Targets
-
-
Target
DeadPayload.exe
-
Size
500KB
-
MD5
4dbebfa079ea4b45eb94e2843180c56b
-
SHA1
820487493a6845752041ca9e0f714025c9eda4bc
-
SHA256
a17456d92d96f3fa579828f04e0530bf650eb92baf68bc414f101f6656c01cda
-
SHA512
b347ac5f39440fad010c8c8e715fb293967ae08b43cf246ea09b328b00a4f35ea6a251e432ad6c26901fb5db8936c57f370df321ae86cb8180e5aee2de57574b
-
SSDEEP
12288:N3DTkV1ilKya0FOUuQ0gH+kmtbF6W05EJXp107sdN:dkGTy
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-