General
-
Target
UPS tracking details.arj
-
Size
547KB
-
Sample
250303-rmv6yszwaw
-
MD5
f06dc9482c3a9e96587cd54f815c186d
-
SHA1
cfa50c835f5cca27d57394ec92eec1f42c2af7a7
-
SHA256
88c769b0619d975edf0db0023e38ed2c7865ed1e1ae1e998b975dfa8733315bc
-
SHA512
f99010ac1deb0747165c83f362c32b8f8c4dbe4fbbbd25d8be8537d5c4e843f08ec1895672670d55df3d173047e632f94bf940d1a11ce984d76e2c09845bd39c
-
SSDEEP
12288:mgYb7P6CRi6lL4DUdMwRpQKRFWxnM87Udd8AP8hcsmsLl:mgwGCom6wRuKRFKM87UJv2l
Static task
static1
Behavioral task
behavioral1
Sample
UPS tracking details.exe
Resource
win7-20241010-en
Malware Config
Extracted
xworm
5.0
56TvElZMbqDoRvU7
-
install_file
USB.exe
Targets
-
-
Target
UPS tracking details.exe
-
Size
851KB
-
MD5
28badf3eb1aa6ce975fee86e6ec1dc14
-
SHA1
8f19c7dbdde308e463b0412d73ea7083b1bcc816
-
SHA256
7f1764a28d27f381701d9254166241607a37a02eb2fe80d682baf15236da5b7e
-
SHA512
eb5da8590065d4a289c75c4f3d3124ecc854398a7e846ddb2c2aec5d136817e393ce8881c539b08d0f3eee79e56ccab5dbe0e57054eccbe97769189cc73f356e
-
SSDEEP
12288:vWMnQ1Kfk7AEYQCJSsFlsIQfYl2N3qWkj9d/qArFK6eNXwC94EBTR+:uj7AEYQCQaKbA63+jPqAUNXjBBT0
-
Detect Xworm Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-