Resubmissions

20-05-2023 17:02

230520-vkggkadg24 10

20-05-2023 16:58

230520-vg8fwagc2z 3

20-05-2023 16:56

230520-vf35rsgb8s 6

General

  • Target

    12.bat

  • Size

    49B

  • Sample

    230520-vkggkadg24

  • MD5

    354ee47d9b7f0877aaecd8db36e01468

  • SHA1

    9bd07f39a7b4980f4565c6a3a47f15d783707df0

  • SHA256

    6ae2b903b9e73ecac6542c15a01cfa044c06ff575b8f86e44e03140a35bea87f

  • SHA512

    20735574ef7634039d9de979e088193eb63d0682c602d2ecaa0296b72e5636de41b53a802d6ce205fc7334c7716c4add716de87205500c0384a55a5265a653f7

Score
10/10

Malware Config

Extracted

Family

xworm

C2

classic-lovers.at.ply.gg:11647

Attributes
  • install_file

    AnyDesk.exe

Targets

    • Target

      12.bat

    • Size

      49B

    • MD5

      354ee47d9b7f0877aaecd8db36e01468

    • SHA1

      9bd07f39a7b4980f4565c6a3a47f15d783707df0

    • SHA256

      6ae2b903b9e73ecac6542c15a01cfa044c06ff575b8f86e44e03140a35bea87f

    • SHA512

      20735574ef7634039d9de979e088193eb63d0682c602d2ecaa0296b72e5636de41b53a802d6ce205fc7334c7716c4add716de87205500c0384a55a5265a653f7

    Score
    10/10
    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks