General
-
Target
file.exe
-
Size
1.4MB
-
Sample
241105-qxyjds1ndx
-
MD5
7d7e24137d26338d8729761d740b0c04
-
SHA1
a50cf1255b04fec0a34ab695993bff21a4a05ddf
-
SHA256
f215e0525ac3365a7d33a949db3a7efa90811992e665e243f385fc00dc653c16
-
SHA512
72c84b53d4a5f488fab1b43ab3e5f4cbd3414d44946d94b3bccff3d29f3083ddcf3ae900efebf2b01585e4836ed0d0085aa1a8dc8650fee18168f3c2bff4b591
-
SSDEEP
24576:vjfZlBBYhEotw3Byz8uTZN8ekilz8CiglbMhupYq3MtXtU4YIuPc8HW6Lp:v7ZTauotw3Bg5TjR8sWuP8t9U2icAW
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:8895
162.230.48.189:8895
ZRGtN7NDh24Vx89x
-
install_file
USB.exe
Targets
-
-
Target
file.exe
-
Size
1.4MB
-
MD5
7d7e24137d26338d8729761d740b0c04
-
SHA1
a50cf1255b04fec0a34ab695993bff21a4a05ddf
-
SHA256
f215e0525ac3365a7d33a949db3a7efa90811992e665e243f385fc00dc653c16
-
SHA512
72c84b53d4a5f488fab1b43ab3e5f4cbd3414d44946d94b3bccff3d29f3083ddcf3ae900efebf2b01585e4836ed0d0085aa1a8dc8650fee18168f3c2bff4b591
-
SSDEEP
24576:vjfZlBBYhEotw3Byz8uTZN8ekilz8CiglbMhupYq3MtXtU4YIuPc8HW6Lp:v7ZTauotw3Bg5TjR8sWuP8t9U2icAW
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-