General

  • Target

    aa.bat

  • Size

    4KB

  • Sample

    241029-r2xnbsxlgj

  • MD5

    e1bb13079136feb8601656942407d6ac

  • SHA1

    b18016cc87ebab626c3c22f9c46f3cb514e16617

  • SHA256

    cb407460fb1c8e860e77d175ba27f129571c3bc95cece9e3a46e17f11e10a758

  • SHA512

    24f9f3ad23f3c7081a4a3cd9f2d1eb7c2bb9ecafb8fe8165e2254fc789f85e2cecbcd49cc2131cf7fec40ff5a0275249f565bf47ea8361a7f9bf11c28a5f961c

  • SSDEEP

    96:qjx1L/Cb/pcm4jdbEtYhOjhKaAYG02uMjeBZkQRdhJjaaAYAn2uMjeBZkozd6z:q9pqcbEt82hKFYG02XqBZpRfRaFYAn2l

Malware Config

Extracted

Family

xworm

Attributes
  • install_file

    USB.exe

  • pastebin_url

    https://pastebin.com/raw/54jZmcfW

  • telegram

    https://api.telegram.org/bot7470467235:AAH5xKlgIYdawUGRmIROyBj64e_oY5ROaic/sendMessage?chat_id=1330099235

Targets

    • Target

      aa.bat

    • Size

      4KB

    • MD5

      e1bb13079136feb8601656942407d6ac

    • SHA1

      b18016cc87ebab626c3c22f9c46f3cb514e16617

    • SHA256

      cb407460fb1c8e860e77d175ba27f129571c3bc95cece9e3a46e17f11e10a758

    • SHA512

      24f9f3ad23f3c7081a4a3cd9f2d1eb7c2bb9ecafb8fe8165e2254fc789f85e2cecbcd49cc2131cf7fec40ff5a0275249f565bf47ea8361a7f9bf11c28a5f961c

    • SSDEEP

      96:qjx1L/Cb/pcm4jdbEtYhOjhKaAYG02uMjeBZkQRdhJjaaAYAn2uMjeBZkozd6z:q9pqcbEt82hKFYG02XqBZpRfRaFYAn2l

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Possible privilege escalation attempt

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks