General

  • Target

    borded.bat

  • Size

    292KB

  • Sample

    241013-v2fatsydmb

  • MD5

    758e9341b9f8217cdb5b0085321d65f7

  • SHA1

    704a2713704861618c153ccbb19847dcb0cdc5ce

  • SHA256

    6f6d8b52f73e7de40ca70f74c1694ee57d9ff8b232ac00982c25f05db8dea39a

  • SHA512

    bca661e49102b89a9c4de60db129472c87346a3bebf831fa847bfefa68896bbe07555c29b2573fa2bee378cd769015d56e1044cb5749d9baedd4f4398f6702a1

  • SSDEEP

    6144:qZztTwoXBISDEO5PvFvC0oFQFTUQKtUlDKtlxRO8Ld8ecYS:qZzt7hDHZtq0oFcUQkzxRO8p0D

Malware Config

Extracted

Family

xworm

C2

147.185.221.16:60447

Attributes
  • Install_directory

    %AppData%

  • install_file

    System User.exe

Targets

    • Target

      borded.bat

    • Size

      292KB

    • MD5

      758e9341b9f8217cdb5b0085321d65f7

    • SHA1

      704a2713704861618c153ccbb19847dcb0cdc5ce

    • SHA256

      6f6d8b52f73e7de40ca70f74c1694ee57d9ff8b232ac00982c25f05db8dea39a

    • SHA512

      bca661e49102b89a9c4de60db129472c87346a3bebf831fa847bfefa68896bbe07555c29b2573fa2bee378cd769015d56e1044cb5749d9baedd4f4398f6702a1

    • SSDEEP

      6144:qZztTwoXBISDEO5PvFvC0oFQFTUQKtUlDKtlxRO8Ld8ecYS:qZzt7hDHZtq0oFcUQkzxRO8p0D

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Deletes itself

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks