General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Language
ps1
Source
URLs
ps1.dropper
https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg%20
exe.dropper
https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg%20
Extracted
Family
xworm
Version
5.0
C2
87.120.116.179:1300
Mutex
iBTnpYLbdYOMKoW3
Attributes
-
install_file
USB.exe
aes.plain
Targets
-
-
Target
https://docs.google.com/uc?export=download&id=13_WhiO-o0MBi5Z2LKYDV40Qh_04jhxzN
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-