General
-
Target
17112024_0044_twBkX.js
-
Size
199KB
-
Sample
241117-a3nndawqby
-
MD5
4ceb1057e744898bc02ffe2a9daa061a
-
SHA1
ccc89e9d665bc204347fbc7346957ed65ef983ba
-
SHA256
d2c8b31ed90c86ec267b673178ce22b36096ff8d705cbf9b5fa8ed4bac87550b
-
SHA512
3a71dba04527b03bb0ee1384f92b33eaa3de7bb3f1521997fd3151ef9ce553bfb5608054919b37c35f0f6f611acf59805949e586e52e3ca2cfc85e57f246c87a
-
SSDEEP
6144:PsnbkwFgwHtYdNCI8UpzdKxJzyU+JnkdTm6YDwDB:jNCzxpDB
Static task
static1
Behavioral task
behavioral1
Sample
17112024_0044_twBkX.js
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
185.162.75.19:7000
AyJZQz7cchpO5oie
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot6460930418:AAGMLktYHOrDqJ5cDoT5GtLWliQfxKax0DI/sendMessage?chat_id=6746471576
Targets
-
-
Target
17112024_0044_twBkX.js
-
Size
199KB
-
MD5
4ceb1057e744898bc02ffe2a9daa061a
-
SHA1
ccc89e9d665bc204347fbc7346957ed65ef983ba
-
SHA256
d2c8b31ed90c86ec267b673178ce22b36096ff8d705cbf9b5fa8ed4bac87550b
-
SHA512
3a71dba04527b03bb0ee1384f92b33eaa3de7bb3f1521997fd3151ef9ce553bfb5608054919b37c35f0f6f611acf59805949e586e52e3ca2cfc85e57f246c87a
-
SSDEEP
6144:PsnbkwFgwHtYdNCI8UpzdKxJzyU+JnkdTm6YDwDB:jNCzxpDB
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-