General

  • Target

    шкибиди туалет.bat

  • Size

    48KB

  • Sample

    241031-rpy1mayjcz

  • MD5

    8855bf2042f8fb32e6b181832242a7e7

  • SHA1

    933026bbb4c10bcef1e1d645ec4f30f3cc9d0525

  • SHA256

    d5a9a013320ba9ccda23abf7ad0e364193e3f7ba84554d4d70b8538084560b08

  • SHA512

    ffcc177442f1af324ffd92af71a86abd182f8698876f6ae05e932dc43598fd82322bcf1b3ef326ec0d2458b786472090e6c6520e6727e7db9c50da91358dfa71

  • SSDEEP

    768:pivffaUlrlLGnaOL0k8LnooYsTUiWruIcO3QXdT7Bqfwx:pia+WaoRxTBWHCA

Malware Config

Extracted

Family

xworm

Version

5.0

C2

application-mess.gl.at.ply.gg:8848

Mutex

QO74sVclgUVzlyXQ

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    XClient.exe

aes.plain

Targets

    • Target

      шкибиди туалет.bat

    • Size

      48KB

    • MD5

      8855bf2042f8fb32e6b181832242a7e7

    • SHA1

      933026bbb4c10bcef1e1d645ec4f30f3cc9d0525

    • SHA256

      d5a9a013320ba9ccda23abf7ad0e364193e3f7ba84554d4d70b8538084560b08

    • SHA512

      ffcc177442f1af324ffd92af71a86abd182f8698876f6ae05e932dc43598fd82322bcf1b3ef326ec0d2458b786472090e6c6520e6727e7db9c50da91358dfa71

    • SSDEEP

      768:pivffaUlrlLGnaOL0k8LnooYsTUiWruIcO3QXdT7Bqfwx:pia+WaoRxTBWHCA

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks