General
-
Target
rootkited.bat
-
Size
440KB
-
Sample
241107-x5k2laxjdv
-
MD5
e484f05f1d6bb25017695938f8f9d1dc
-
SHA1
31b317dbf41bea5ef0e1338ba1dfedb019c4a606
-
SHA256
bad67dd9454a5d74dd958eda8ac49c6682d798d3182aeeb1ee198ce3e66f5109
-
SHA512
27375f90ca85c1a1393a1bfa243abdce413bca3a4cfde9ef80a890c93ed0b16f79ce1111671ba2a6fb6f12e5c1dfe6f0c026bc1ced01c24f7a106eaaaecd6984
-
SSDEEP
12288:Vq1Mvj0LPw0oYCy1Jx5oZamp0RHHwJOtx:VljsI0dC68Za80BQEx
Static task
static1
Malware Config
Extracted
xworm
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/54jZmcfW
-
telegram
https://api.telegram.org/bot7470467235:AAH5xKlgIYdawUGRmIROyBj64e_oY5ROaic/sendMessage?chat_id=1330099235
Targets
-
-
Target
rootkited.bat
-
Size
440KB
-
MD5
e484f05f1d6bb25017695938f8f9d1dc
-
SHA1
31b317dbf41bea5ef0e1338ba1dfedb019c4a606
-
SHA256
bad67dd9454a5d74dd958eda8ac49c6682d798d3182aeeb1ee198ce3e66f5109
-
SHA512
27375f90ca85c1a1393a1bfa243abdce413bca3a4cfde9ef80a890c93ed0b16f79ce1111671ba2a6fb6f12e5c1dfe6f0c026bc1ced01c24f7a106eaaaecd6984
-
SSDEEP
12288:Vq1Mvj0LPw0oYCy1Jx5oZamp0RHHwJOtx:VljsI0dC68Za80BQEx
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-