General
-
Target
Loader.bat
-
Size
192KB
-
Sample
240715-q8k3fawglb
-
MD5
a94e4dec22b09ea37e33fdfa3638e5de
-
SHA1
f90c1ea98c741bc63a3260721d1974962b9241ce
-
SHA256
bb484dd134c649c660dbde9ceb4fe1fbac7e65fb934d8a9c288c1e86d1b189f4
-
SHA512
a747324043860c06f28d4d7880a1df9f2bfbc6563fd42dffa76f3425a123aeb9bef29a4706dd11851f25c58acbf0c2fdfed775d68e9cb888b88a77ff2c0c6e0b
-
SSDEEP
3072:GTv0B0ylSYSg4xt9mYNjvI6L41JOELI7m5Y+fk3T0dcZAIG0+BWtOy15c:Q0iyQC4xt4Y26c1kEU7uBuWMAISA5c
Static task
static1
Behavioral task
behavioral1
Sample
Loader.bat
Resource
win10v2004-20240709-en
Malware Config
Extracted
xworm
unique-emotions.gl.at.ply.gg:54742
wiz.bounceme.net:6000
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
asyncrat
0.5.8
Default
card-buzz.gl.at.ply.gg:2497
rotrzgmheqhT
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Loader.bat
-
Size
192KB
-
MD5
a94e4dec22b09ea37e33fdfa3638e5de
-
SHA1
f90c1ea98c741bc63a3260721d1974962b9241ce
-
SHA256
bb484dd134c649c660dbde9ceb4fe1fbac7e65fb934d8a9c288c1e86d1b189f4
-
SHA512
a747324043860c06f28d4d7880a1df9f2bfbc6563fd42dffa76f3425a123aeb9bef29a4706dd11851f25c58acbf0c2fdfed775d68e9cb888b88a77ff2c0c6e0b
-
SSDEEP
3072:GTv0B0ylSYSg4xt9mYNjvI6L41JOELI7m5Y+fk3T0dcZAIG0+BWtOy15c:Q0iyQC4xt4Y26c1kEU7uBuWMAISA5c
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1