General
-
Target
28f00102733ebd8d49df607dc67b5e4a569137d9bc46a5908ec9f5930aaa8804.js
-
Size
37KB
-
Sample
241102-p8m2csveqr
-
MD5
e92cc1e935c40fea032292de0c6504e7
-
SHA1
a3a36073c53845f94faded04e4c9cf54873a87b2
-
SHA256
28f00102733ebd8d49df607dc67b5e4a569137d9bc46a5908ec9f5930aaa8804
-
SHA512
aa826cf61930bd095c678d9af0401d2429f61e2bf7d47fb6700e96db496791a5659dd81e1686293915a51f6dc94d59cfe02ca10fc7ba0350d56222fddb564845
-
SSDEEP
384:8ZZ9ZZ9ZZ9ZZRZZ9ZZ9ZZ9ZZlbPZZ9ZZcZZ9ZZ9ZZ9ZZXZZ9ZZ9ZZ9ZZl/ZZ9ZZm:Ywqfm7jk
Static task
static1
Behavioral task
behavioral1
Sample
28f00102733ebd8d49df607dc67b5e4a569137d9bc46a5908ec9f5930aaa8804.js
Resource
win7-20240903-en
Malware Config
Extracted
http://paradisoprovisor1.hospedagemdesites.ws/wp-admin/images/about-heade-about.svg
Extracted
xworm
3.1
45.40.96.97:7000
U7A2Hi5eLNhvuoqw
-
install_file
USB.exe
Targets
-
-
Target
28f00102733ebd8d49df607dc67b5e4a569137d9bc46a5908ec9f5930aaa8804.js
-
Size
37KB
-
MD5
e92cc1e935c40fea032292de0c6504e7
-
SHA1
a3a36073c53845f94faded04e4c9cf54873a87b2
-
SHA256
28f00102733ebd8d49df607dc67b5e4a569137d9bc46a5908ec9f5930aaa8804
-
SHA512
aa826cf61930bd095c678d9af0401d2429f61e2bf7d47fb6700e96db496791a5659dd81e1686293915a51f6dc94d59cfe02ca10fc7ba0350d56222fddb564845
-
SSDEEP
384:8ZZ9ZZ9ZZ9ZZRZZ9ZZ9ZZ9ZZlbPZZ9ZZcZZ9ZZ9ZZ9ZZXZZ9ZZ9ZZ9ZZl/ZZ9ZZm:Ywqfm7jk
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-