General
-
Target
dbfe1e570510947bc6faaecfb3c84ea248e7bd8da1a54a4a669b64c00dc3b54c.vbs
-
Size
72KB
-
Sample
250308-rx7bzaytd1
-
MD5
680c4f499e1b3ce5242349c3b7e5eb4f
-
SHA1
2cabfc9124e28bade1772972866510c9c4442d18
-
SHA256
dbfe1e570510947bc6faaecfb3c84ea248e7bd8da1a54a4a669b64c00dc3b54c
-
SHA512
ce82cb6470d4afc4070ca663159aa12c1a548e503d20eaa773e307ec8539d3ced7cab0f53f14f1f001d6443f1900376a1ce0512e637f2220a1e2c76e50ce3591
-
SSDEEP
1536:5lMsUJ3S4mY8I9tSstS3z8e9IEnHDc9EFMLSEGgcX4XTA66MrhM:5asUJ3SrI9tSskj8e+EHY9Bfja
Static task
static1
Behavioral task
behavioral1
Sample
dbfe1e570510947bc6faaecfb3c84ea248e7bd8da1a54a4a669b64c00dc3b54c.vbs
Resource
win7-20240903-en
Malware Config
Extracted
xworm
5.0
expressblessingnow001.duckdns.org:3911
RGibYsdTDFPkg2QK
-
install_file
USB.exe
Targets
-
-
Target
dbfe1e570510947bc6faaecfb3c84ea248e7bd8da1a54a4a669b64c00dc3b54c.vbs
-
Size
72KB
-
MD5
680c4f499e1b3ce5242349c3b7e5eb4f
-
SHA1
2cabfc9124e28bade1772972866510c9c4442d18
-
SHA256
dbfe1e570510947bc6faaecfb3c84ea248e7bd8da1a54a4a669b64c00dc3b54c
-
SHA512
ce82cb6470d4afc4070ca663159aa12c1a548e503d20eaa773e307ec8539d3ced7cab0f53f14f1f001d6443f1900376a1ce0512e637f2220a1e2c76e50ce3591
-
SSDEEP
1536:5lMsUJ3S4mY8I9tSstS3z8e9IEnHDc9EFMLSEGgcX4XTA66MrhM:5asUJ3SrI9tSskj8e+EHY9Bfja
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-