General
-
Target
241204-p9yjgs1nbp_pw_infected.zip
-
Size
14.1MB
-
Sample
241204-rz18qstmbl
-
MD5
ffddb4d8714809e17e1e1b19cb085b8c
-
SHA1
e7b635844b198af1e84fe00aad8c322eeafea51a
-
SHA256
74d74bfdd9852c7967a852d632c16dc347b358fead85c04b04a809d9a35fb2c9
-
SHA512
26cece41f6bb1903398813116c0fc27a25c205ee0ae6ae930fe7fe263f60cb86a0cfc76c40cef5851671e7c11191a8e45b27b1ef55222b6575abe7bf2cfe309e
-
SSDEEP
393216:kBkHW+0ozLt+tYFj37O1/CKw+JFu/HObglFPh8OW:k+HN7LtFp37O1/yC7gbPU
Malware Config
Extracted
https://176.111.174.138/usersync/tradedesk/_rp
Extracted
xworm
5.0
week-dictionary.gl.at.ply.gg:12466
WIHzy7HOqD8TiFlq
-
Install_directory
%AppData%
-
install_file
PowerShell.exe
Targets
-
-
Target
niggers.exe
-
Size
14.3MB
-
MD5
8a44ee98217bc81f0869d793eefab1f0
-
SHA1
4756ed10cbf5dbad09746a8fa2c2e62c2f2b7200
-
SHA256
c26e2475ef60ba969bb66c9b464b498efb1da0bf7360ff7545c1db3b707bdbed
-
SHA512
4f18f54d791929cb24c02e8865d520e6263c096bef7ebd422578bca0600cadb6ea4b046654ef007ba056bf568ff3a19b068bf4313b4a218953a5bd2ecb0e6a02
-
SSDEEP
393216:vOWd863huc1dQJlAwF3MnG3InVFedWm7NS/xHWgnHz:2893hr1dQ53MG4VAHsT
-
Detect Xworm Payload
-
Njrat family
-
Ta505 family
-
Xworm family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-