General
-
Target
rat source (1).bat
-
Size
8KB
-
Sample
240726-x1qraaseme
-
MD5
71625b19d0e541d47bc8ebaecbafd90b
-
SHA1
adff53d3670dff92cb81958499419ef34d3a272f
-
SHA256
378e258b6da98b9f20497500d4e40fb19cf63bc2946f00f4139a3f46b745c82a
-
SHA512
fb949b9c6cab9e3fd2eab101bf071c3c19fcd60e5b079848b1edb626d97a87cca5806d639f2d6521f2be3e0a94f692693c482682aad13b639fa51a2a98335bf0
-
SSDEEP
192:2RngaveQ7/HcgdMVtTviDizHclFgGcUOHjeeeU4Yheeen3gWDeeeVDjeeeU2GhfE:2RngaveQ7/HcgdMVtTvGizHclFgGcUO0
Static task
static1
Behavioral task
behavioral1
Sample
rat source (1).bat
Resource
win10-20240404-en
Malware Config
Extracted
xworm
thought-intend.gl.at.ply.gg:15854
-
Install_directory
%Public%
-
install_file
discord.exe
Targets
-
-
Target
rat source (1).bat
-
Size
8KB
-
MD5
71625b19d0e541d47bc8ebaecbafd90b
-
SHA1
adff53d3670dff92cb81958499419ef34d3a272f
-
SHA256
378e258b6da98b9f20497500d4e40fb19cf63bc2946f00f4139a3f46b745c82a
-
SHA512
fb949b9c6cab9e3fd2eab101bf071c3c19fcd60e5b079848b1edb626d97a87cca5806d639f2d6521f2be3e0a94f692693c482682aad13b639fa51a2a98335bf0
-
SSDEEP
192:2RngaveQ7/HcgdMVtTviDizHclFgGcUOHjeeeU4Yheeen3gWDeeeVDjeeeU2GhfE:2RngaveQ7/HcgdMVtTvGizHclFgGcUO0
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3