General
-
Target
nnn.txt
-
Size
1.1MB
-
Sample
241203-nrpcestmcw
-
MD5
d339683a764e49413878a53ecca1115e
-
SHA1
b1cdad94beb95570bf79ce8ddce303a6adc6a645
-
SHA256
6fd73d755b0173df9d053ee54130059e4ffabbd12cf220a4475137943cae7461
-
SHA512
1ad85d4af989bcbae1a9d14fd46adacef7fc060997171d4685bdc64f55fe0dcd3b006764e68ac89c61ccd43a2273a0abdb71b3b3ef29708dbd68c3391bcc9649
-
SSDEEP
24576:/2YKVYezmE95uretDFKzOBEwAftuvmYpMtSHc/JW1:/2YKVPCeeb5YO908/JW
Static task
static1
Behavioral task
behavioral1
Sample
nnn.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
41.216.183.218:59865
uPvgCPFOpAYI9aFz
-
install_file
USB.exe
Targets
-
-
Target
nnn.txt
-
Size
1.1MB
-
MD5
d339683a764e49413878a53ecca1115e
-
SHA1
b1cdad94beb95570bf79ce8ddce303a6adc6a645
-
SHA256
6fd73d755b0173df9d053ee54130059e4ffabbd12cf220a4475137943cae7461
-
SHA512
1ad85d4af989bcbae1a9d14fd46adacef7fc060997171d4685bdc64f55fe0dcd3b006764e68ac89c61ccd43a2273a0abdb71b3b3ef29708dbd68c3391bcc9649
-
SSDEEP
24576:/2YKVYezmE95uretDFKzOBEwAftuvmYpMtSHc/JW1:/2YKVPCeeb5YO908/JW
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-