General
-
Target
8ea5d82e846f1b78fd4f7a1be3008ed4.zip
-
Size
21KB
-
Sample
250124-apfqlszqcy
-
MD5
8ea5d82e846f1b78fd4f7a1be3008ed4
-
SHA1
c665d5c95ea97dd48cbbd2cc8c15598333d6cb3e
-
SHA256
ff82ba209528783a4321e1281c0db4e06718f6d1985cb8d93536a02b60c8379c
-
SHA512
6d96591becb14d0d16bb142f1c4e301b598fac07f4ea4774babbddf7779b2ebe2c405d25c64765e92167ef284bfa54d5a04e8c819bb0017b1fa5104da1e94f30
-
SSDEEP
384:CE7nZ3mWZ8NbzO4TgH24Ewb5IReDUVhiMXQw4HV+E9sqcyf+yAsa7Jluhz+e6:H7Z2WZeiFH24Ewb2ReYbpXdcV+w6yfTc
Static task
static1
Behavioral task
behavioral1
Sample
CENDO RAMA JUDICIAL - Oficio 392 - OFICIO Y DETALLE DE ACTUACIÓN JUDICIAL.js
Resource
win7-20240903-en
Malware Config
Extracted
https://res.cloudinary.com/daxwua63y/image/upload/v1737543662/new_image_h8btwc.jpg%20
https://res.cloudinary.com/daxwua63y/image/upload/v1737543662/new_image_h8btwc.jpg%20
Extracted
xworm
5.0
87.120.116.179:1300
D9SUsC7nLI4t2dR8
-
install_file
USB.exe
Targets
-
-
Target
CENDO RAMA JUDICIAL - Oficio 392 - OFICIO Y DETALLE DE ACTUACIÓN JUDICIAL.js
-
Size
73KB
-
MD5
ececcb43f7f2e1f294047fee6512849b
-
SHA1
ab25ccd9dc155e90b1828ac77b4deacfff2bd98d
-
SHA256
b03d8e95d48272334f35836a28a163f153eb3b00e97ce0466a3dce8202527f23
-
SHA512
fb2cd31e8f258fcadef22ff71686e1f8417d157b9bd56f0e2ac0493e92b8d0be5a1435977a7dfbe1dd14ac145ac41e1f73d893515fea823f02a51387a0815f4d
-
SSDEEP
1536:4l4izQ6VsYX/f53KKxAlFlwWJOKumLcAJ152k6:41zQ6Vj/BKpW
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-