General
-
Target
Hoax_Optimizations_Panel.bat
-
Size
519KB
-
Sample
240614-zjmz6syglq
-
MD5
ed70fa278e4ecacb1dc505dffe9f5ac1
-
SHA1
89a2f505bfee5c57a6c8ecf67692a56a72d16b2e
-
SHA256
b075e988772ccdfded34bb5594862a5e1e31a3917a09454ab995ac6008e21f8f
-
SHA512
af73f57bf21479b135a3a8f75fb3f5bb8be55492700debb775ea8b06808cd2d515f355cd0c81396de378981e57986af8016e1d1f0bf060008d6c91f172d00c59
-
SSDEEP
12288:7cjQ4P3NJqh+sPvAEZfufOqiD9NKzRlmj+VJsa6:7M7+PvDf4OBO84sa6
Static task
static1
Behavioral task
behavioral1
Sample
Hoax_Optimizations_Panel.bat
Resource
win7-20240508-en
Malware Config
Extracted
xworm
loans-clip.gl.at.ply.gg:6807
-
Install_directory
%AppData%
-
install_file
BloxstrapModded.exe
Targets
-
-
Target
Hoax_Optimizations_Panel.bat
-
Size
519KB
-
MD5
ed70fa278e4ecacb1dc505dffe9f5ac1
-
SHA1
89a2f505bfee5c57a6c8ecf67692a56a72d16b2e
-
SHA256
b075e988772ccdfded34bb5594862a5e1e31a3917a09454ab995ac6008e21f8f
-
SHA512
af73f57bf21479b135a3a8f75fb3f5bb8be55492700debb775ea8b06808cd2d515f355cd0c81396de378981e57986af8016e1d1f0bf060008d6c91f172d00c59
-
SSDEEP
12288:7cjQ4P3NJqh+sPvAEZfufOqiD9NKzRlmj+VJsa6:7M7+PvDf4OBO84sa6
-
Detect Xworm Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3