General

  • Target

    basbasbas.bat

  • Size

    1KB

  • Sample

    240516-mn1evage2t

  • MD5

    ddd451685225b980bb2e0789090d3ff5

  • SHA1

    cafbfce346a90aef87782e8ff87a626e5ffa6b05

  • SHA256

    1bc72757a82f2f9c7bdf9a5d19de6f28c53ba3b4f8eba8dcb5f4590e7affae39

  • SHA512

    78e4e8724522abe7170f2e26143fc72cd632eb23b8ba6499558ab1c37e430a53d4f37aeec9f93b6fb465c84e5a476057178ceb6f7f3c728c5c4c21dced02f0da

Malware Config

Extracted

Family

xworm

Version

3.1

C2

freshinxworm.ddns.net:7000

Mutex

gqDWp48TjRIAdwF2

Attributes
  • install_file

    USB.exe

aes.plain

Targets

    • Target

      basbasbas.bat

    • Size

      1KB

    • MD5

      ddd451685225b980bb2e0789090d3ff5

    • SHA1

      cafbfce346a90aef87782e8ff87a626e5ffa6b05

    • SHA256

      1bc72757a82f2f9c7bdf9a5d19de6f28c53ba3b4f8eba8dcb5f4590e7affae39

    • SHA512

      78e4e8724522abe7170f2e26143fc72cd632eb23b8ba6499558ab1c37e430a53d4f37aeec9f93b6fb465c84e5a476057178ceb6f7f3c728c5c4c21dced02f0da

    • Detect Xworm Payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Program crash

MITRE ATT&CK Enterprise v15

Tasks