General
-
Target
BlitzedV12.rar
-
Size
6.1MB
-
Sample
250125-l5jmzsxrdx
-
MD5
8e314e20dbcf8a39f70530acd4c310a0
-
SHA1
4b3a0fb8c6a5af4d209bd191e9132f76d07586df
-
SHA256
7191ca1e3053e459c10aec9281eeb98a94f36fa0134085b2c2386741a6e18f6b
-
SHA512
4f1aadad72c154bc6c3747992d197b3da21aec0308298c9442bc8542aa374c0d15dc37641d549496d2c5f8b315951d475764e57b46ce74b2fac6607f73e76786
-
SSDEEP
196608:BgSNHp3IT47kDX6bH8ZQMMdVx4lBqrk9zhu/EG:BPVdhQDX6bH8ZQMuHsBLc/N
Static task
static1
Behavioral task
behavioral1
Sample
BlitzedGrabberV12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BlitzedGrabberV12.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
3.1
stores-anytime.at.ply.gg:36673
S2a8VYouw8L5LAad
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
BlitzedGrabberV12.exe
-
Size
4.7MB
-
MD5
f1417759e105ff9909ed454ad5db48a0
-
SHA1
d8ff4cfa49616988882f1d4e6318db869acd75ce
-
SHA256
966cee8682727f4f09d137b4924ec6daeb7c0b9dcb8b9700be8c3e73c57c6b60
-
SHA512
e0359c601e59b56c1d5e324c85692b3f3db94adb1a2110c5fd3e6ab248475d27fa1f2aff86f57c0d99ae328cf4e68783a84af41049d7856c3b940ab6ef19b675
-
SSDEEP
98304:hmVrrT79MEH/TSbOJfUhEpZlm5qqCabiiSXiBuxIr7n:h2rlMEfTa6fUWlQzCaWiIsX
-
Detect Xworm Payload
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-