General
-
Target
https://bitbucket.org/vasoyeti/compu/downloads/No_00014052024_COBRO_JUR%C3%8DDICO_VIGENTE_FECHA_5_DE_DICIEMBRE_DE_2024.tar
-
Sample
250120-p6grkazpam
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bitbucket.org/vasoyeti/compu/downloads/No_00014052024_COBRO_JUR%C3%8DDICO_VIGENTE_FECHA_5_DE_DICIEMBRE_DE_2024.tar
Resource
win10v2004-20241007-es
windows10-2004-x64
20 signatures
150 seconds
Malware Config
Extracted
Family
xworm
Version
5.0
C2
87.120.116.179:1300
Mutex
3K4hxUJ98OMO2ygA
Attributes
-
install_file
USB.exe
aes.plain
Targets
-
-
Target
https://bitbucket.org/vasoyeti/compu/downloads/No_00014052024_COBRO_JUR%C3%8DDICO_VIGENTE_FECHA_5_DE_DICIEMBRE_DE_2024.tar
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-