General
-
Target
borded.bat
-
Size
292KB
-
Sample
241013-v2fatsydmb
-
MD5
758e9341b9f8217cdb5b0085321d65f7
-
SHA1
704a2713704861618c153ccbb19847dcb0cdc5ce
-
SHA256
6f6d8b52f73e7de40ca70f74c1694ee57d9ff8b232ac00982c25f05db8dea39a
-
SHA512
bca661e49102b89a9c4de60db129472c87346a3bebf831fa847bfefa68896bbe07555c29b2573fa2bee378cd769015d56e1044cb5749d9baedd4f4398f6702a1
-
SSDEEP
6144:qZztTwoXBISDEO5PvFvC0oFQFTUQKtUlDKtlxRO8Ld8ecYS:qZzt7hDHZtq0oFcUQkzxRO8p0D
Static task
static1
Behavioral task
behavioral1
Sample
borded.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
borded.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
147.185.221.16:60447
-
Install_directory
%AppData%
-
install_file
System User.exe
Targets
-
-
Target
borded.bat
-
Size
292KB
-
MD5
758e9341b9f8217cdb5b0085321d65f7
-
SHA1
704a2713704861618c153ccbb19847dcb0cdc5ce
-
SHA256
6f6d8b52f73e7de40ca70f74c1694ee57d9ff8b232ac00982c25f05db8dea39a
-
SHA512
bca661e49102b89a9c4de60db129472c87346a3bebf831fa847bfefa68896bbe07555c29b2573fa2bee378cd769015d56e1044cb5749d9baedd4f4398f6702a1
-
SSDEEP
6144:qZztTwoXBISDEO5PvFvC0oFQFTUQKtUlDKtlxRO8Ld8ecYS:qZzt7hDHZtq0oFcUQkzxRO8p0D
Score10/10-
Detect Xworm Payload
-
Blocklisted process makes network request
-
Deletes itself
-
Adds Run key to start application
-