General

  • Target

    Sharp CS V1.bat

  • Size

    555B

  • Sample

    240629-qnz1vs1erm

  • MD5

    0d521243334977834c249e26f879d0e5

  • SHA1

    c8a6339e8aff5ac5db00dae42a5f8c577b814421

  • SHA256

    cb8da43f966cd7d743931093a1bf1368ab46628357b957407844c05d7af14e5c

  • SHA512

    32182d1b82b55eeb771e816f3fc60a02adf8c6224407f52f2e92eb6649143e0b8d4901f1167b32f096425937d855111948dc40a7969ed8d4433485cf7628172d

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0MzQwMDg0MDc3NDE2MDM4NQ.Gnre8o.K_NB2WHxREqF5j5C1y9xsPSpv67TWHFacISXVA

  • server_id

    1256564842899181648

Extracted

Family

xworm

C2

147.185.221.20:5050

192.168.1.11:5050

Attributes
  • Install_directory

    %AppData%

  • install_file

    Client.exe

Targets

    • Target

      Sharp CS V1.bat

    • Size

      555B

    • MD5

      0d521243334977834c249e26f879d0e5

    • SHA1

      c8a6339e8aff5ac5db00dae42a5f8c577b814421

    • SHA256

      cb8da43f966cd7d743931093a1bf1368ab46628357b957407844c05d7af14e5c

    • SHA512

      32182d1b82b55eeb771e816f3fc60a02adf8c6224407f52f2e92eb6649143e0b8d4901f1167b32f096425937d855111948dc40a7969ed8d4433485cf7628172d

    • Detect Xworm Payload

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks