General
-
Target
SuryetexOrder_PO2025306.pdf.lnk
-
Size
3KB
-
Sample
250307-tfrw3asyb1
-
MD5
0bab2699985e9608e29bf856b17d8244
-
SHA1
2a5236c305599dfeb95477cc230f248597910782
-
SHA256
46c5104b98da465b208c05d2ae557194d166b4b149aa3d12a148657bef0eb96b
-
SHA512
3554e19d9ceea894b611e4ed491b1156310097b1ab3644433198913fdb077af321e0b344f76bb1d12687d35a1ad46bbc4c5661701e9153d2d00a25dd0e8487a0
Static task
static1
Behavioral task
behavioral1
Sample
SuryetexOrder_PO2025306.pdf.lnk
Resource
win7-20240903-en
Malware Config
Extracted
http://87.121.79.103/download/6b4cc14c9c6445989353e73e97374f17.txt
Extracted
xworm
5.0
remnew25.duckdns.org:3984
XqNiNJ9BHQEGZDPh
-
install_file
USB.exe
Targets
-
-
Target
SuryetexOrder_PO2025306.pdf.lnk
-
Size
3KB
-
MD5
0bab2699985e9608e29bf856b17d8244
-
SHA1
2a5236c305599dfeb95477cc230f248597910782
-
SHA256
46c5104b98da465b208c05d2ae557194d166b4b149aa3d12a148657bef0eb96b
-
SHA512
3554e19d9ceea894b611e4ed491b1156310097b1ab3644433198913fdb077af321e0b344f76bb1d12687d35a1ad46bbc4c5661701e9153d2d00a25dd0e8487a0
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-