General

  • Target

    https://cdn.discordapp.com/attachments/1303767638547234836/1304138633686814834/Start.bat?ex=672e4d3f&is=672cfbbf&hm=9988df6f36f64cc41ae51d4ed4b550207a8bacbb610cfec92ae3add6388c0140&

  • Sample

    241107-wax71awlc1

Malware Config

Extracted

Family

xworm

C2

here-thinking.gl.at.ply.gg:50161

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    WindowsSecurity.exe

Targets

    • Target

      https://cdn.discordapp.com/attachments/1303767638547234836/1304138633686814834/Start.bat?ex=672e4d3f&is=672cfbbf&hm=9988df6f36f64cc41ae51d4ed4b550207a8bacbb610cfec92ae3add6388c0140&

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks