General
-
Target
n4jy44.zip
-
Size
1.1MB
-
Sample
250119-tbx8aavjbz
-
MD5
69970a8e87c5f74862fd8226a8caa0b1
-
SHA1
bb6749a19c04d07b84f7928a8acf37d18abe2882
-
SHA256
88d0612d150853b8e7f3d3e3bfbc5d96d0469df4b53b6e2afbb882e39324b3c6
-
SHA512
1532fc72cfb5b3bd6e0e274e5d6fe1f3226ded0415aa5baf7d1d6828094fe2dc0e4fb13449f1f2fee9ef0994222bea5d8d83074f8d3f58bd18a8a706f7395a5d
-
SSDEEP
24576:VpTcb0buDzgfSKWQKGPzhfdfy2Np9nSlBYJkH4ghPDgeA/M:VpjqDEfyGPzXy2Npcla8h5OM
Static task
static1
Behavioral task
behavioral1
Sample
Nezur_Internal.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
drive-mens.gl.at.ply.gg:20498
-
Install_directory
%AppData%
-
install_file
SystemUser.exe
Targets
-
-
Target
Nezur_Internal.exe
-
Size
1.3MB
-
MD5
c8e3253dfa6d5a21b87950dd7eb2c652
-
SHA1
c0d8849408efd3b42e07b8f43ecb2979158c9c0f
-
SHA256
b8d5ab8adf0da37f5fcd09e09d3bab66458f4cd6fefc5760daa8c247fd55eb76
-
SHA512
efa4cc3ccaa797c9f9c64c4aa6f4f0aa995d3e36bfe0563b7ffce0978ff880bc4fa913c363fbf7792fe552753098e870642b35602cf8625938e9ff84a1d376d9
-
SSDEEP
24576:cUTaQIolipFeyKvY4JMdA9MpBO++aBIbH1CAB1v:caIowzeth9KIbHhBp
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-