General
-
Target
UnbanMethod (1).vbs
-
Size
89KB
-
Sample
240326-x9qgwadc5z
-
MD5
72cf206b269b2c0b9e3a601f97b9ab8e
-
SHA1
1bc8a24ad5c25193a3c29eabf92a6ed0e3a16e85
-
SHA256
d4822834f2b795a73ea0c7bb96ffab5cde0bd6c6416448a58bdbee2d96b205ba
-
SHA512
cfff2a766553e77455bcc29400b62765a0eff9639720a6929fe1b27512d1a68e174907c2c49bcd57993cd0d7226815eb73af808d01377e71d1b6af59fdb92482
-
SSDEEP
1536:U6QBB7uew9rguJQNAdoPBurCM4khS/GL6aVh4HgHH5o3zweI:U6QH7Jw9vKAd7ODkhSsZVak5o3zwL
Static task
static1
Behavioral task
behavioral1
Sample
UnbanMethod (1).vbs
Resource
win11-20240221-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/MUARtvHT
Targets
-
-
Target
UnbanMethod (1).vbs
-
Size
89KB
-
MD5
72cf206b269b2c0b9e3a601f97b9ab8e
-
SHA1
1bc8a24ad5c25193a3c29eabf92a6ed0e3a16e85
-
SHA256
d4822834f2b795a73ea0c7bb96ffab5cde0bd6c6416448a58bdbee2d96b205ba
-
SHA512
cfff2a766553e77455bcc29400b62765a0eff9639720a6929fe1b27512d1a68e174907c2c49bcd57993cd0d7226815eb73af808d01377e71d1b6af59fdb92482
-
SSDEEP
1536:U6QBB7uew9rguJQNAdoPBurCM4khS/GL6aVh4HgHH5o3zweI:U6QH7Jw9vKAd7ODkhSsZVak5o3zwL
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Modifies Installed Components in the registry
-
Drops startup file
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-