General

  • Target

    requirements.bat

  • Size

    1KB

  • Sample

    240410-xhz71abf41

  • MD5

    c1e3f708840cc33d7ae07d1ede3c2d22

  • SHA1

    a517cdd184e2299c45dc8d48148500c479d44d2a

  • SHA256

    0cd3ea79eb2216a39bd59ac4fa50d267f411c5b9eea8f03a2b2f0f01a6b1cd36

  • SHA512

    59815b07498d00ead1457b3feb69e83b152edbe0d966ffcb735aa7d8cff2b9c69641fbb3121b31771e02ceb912576e1f90eecc1cc9e7c1741580598cb180a3c9

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/robloxdev1223/requirements/raw/main/requirements.exe

Extracted

Family

xworm

C2

193.222.96.100:5555

Attributes
  • Install_directory

    %Temp%

  • install_file

    requirements.exe

Targets

    • Target

      requirements.bat

    • Size

      1KB

    • MD5

      c1e3f708840cc33d7ae07d1ede3c2d22

    • SHA1

      a517cdd184e2299c45dc8d48148500c479d44d2a

    • SHA256

      0cd3ea79eb2216a39bd59ac4fa50d267f411c5b9eea8f03a2b2f0f01a6b1cd36

    • SHA512

      59815b07498d00ead1457b3feb69e83b152edbe0d966ffcb735aa7d8cff2b9c69641fbb3121b31771e02ceb912576e1f90eecc1cc9e7c1741580598cb180a3c9

    • Detect Xworm Payload

    • Modifies Windows Defender Real-time Protection settings

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks