Resubmissions
12-11-2024 19:51
241112-yk6y1asrep 10General
-
Target
Arduino.ino
-
Size
753B
-
Sample
241112-yk6y1asrep
-
MD5
bad8ee7aaff8ec856f69fedda9626501
-
SHA1
b2051bfa6415c08db7f61ddd88511af7a6361d8e
-
SHA256
fb764f1a547a99a62584b1c57ecb1b852fd3f0ce6bf742f2806fd2d86fff2ea3
-
SHA512
96ef127b219c4801a5dc82c7ef1937e80e6e880172debe8ea6345ca69d7f628bdf3a035c142e286d4a5cb6bb1cc135770fcffa1669dda32709888036a10429f1
Static task
static1
Malware Config
Extracted
xworm
127.0.0.1:56069
front-applications.gl.at.ply.gg:56069
-
install_file
USB.exe
Targets
-
-
Target
Arduino.ino
-
Size
753B
-
MD5
bad8ee7aaff8ec856f69fedda9626501
-
SHA1
b2051bfa6415c08db7f61ddd88511af7a6361d8e
-
SHA256
fb764f1a547a99a62584b1c57ecb1b852fd3f0ce6bf742f2806fd2d86fff2ea3
-
SHA512
96ef127b219c4801a5dc82c7ef1937e80e6e880172debe8ea6345ca69d7f628bdf3a035c142e286d4a5cb6bb1cc135770fcffa1669dda32709888036a10429f1
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-