General
-
Target
example.lnk
-
Size
106KB
-
Sample
250306-rbbyyazvds
-
MD5
6975af881b0b0e3751002dcc064b886a
-
SHA1
fa4fe5dfc3897677ee5b5c69cd189e4167427d37
-
SHA256
f5e258657d2fff2421af1045023ed6ffa0b2c5bdbee9cb186f143ee47320b0a3
-
SHA512
6ffa48d6d88ea3466a23e793aaca6288e4175c3cae4daa695213aaaa747077795ec5ea5aad0fb666aa59dff14922c8ef70f39245bafed5f891bf815e6eafb587
-
SSDEEP
3072:pMFdgBocsBz76H4ELGylzlAX8tKWdJTU+S4St:pMFdgBoRN7yHOorJTU+S4St
Static task
static1
Malware Config
Extracted
xworm
5.0
181.214.214.6:30120
z5dRlxK0ktwBzYfm
-
Install_directory
%ProgramData%
-
install_file
NVIDIA app.exe
Targets
-
-
Target
example.lnk
-
Size
106KB
-
MD5
6975af881b0b0e3751002dcc064b886a
-
SHA1
fa4fe5dfc3897677ee5b5c69cd189e4167427d37
-
SHA256
f5e258657d2fff2421af1045023ed6ffa0b2c5bdbee9cb186f143ee47320b0a3
-
SHA512
6ffa48d6d88ea3466a23e793aaca6288e4175c3cae4daa695213aaaa747077795ec5ea5aad0fb666aa59dff14922c8ef70f39245bafed5f891bf815e6eafb587
-
SSDEEP
3072:pMFdgBocsBz76H4ELGylzlAX8tKWdJTU+S4St:pMFdgBoRN7yHOorJTU+S4St
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-