General

  • Target

    F_0a Pahnotom.bat

  • Size

    314KB

  • Sample

    241111-p72hcssqek

  • MD5

    e15c30227305c76972d8ecf85d4b31bc

  • SHA1

    d192b94c852427ee1607c1bb45fb504130f66d33

  • SHA256

    7096d59bcb168595ff5f95c7eb287ebe8de315f0af34b4d5c78a7363ae24cad5

  • SHA512

    30fc1d2fa65d826cfc055be59c729f3a697988830a8e7b9093c088969d43a29fc43798bde7639dc38236f30d40c510bd5502f83244674bbc33a425f3a2a177ca

  • SSDEEP

    6144:rS54Nvug0//LU31XygG+Ooyf5z7q3DACE2lq:rqKmX//O1Crou5zADbzq

Malware Config

Extracted

Family

xworm

C2

135.125.21.87:7000

Attributes
  • Install_directory

    %Temp%

  • install_file

    Anticheat.exe

Targets

    • Target

      F_0a Pahnotom.bat

    • Size

      314KB

    • MD5

      e15c30227305c76972d8ecf85d4b31bc

    • SHA1

      d192b94c852427ee1607c1bb45fb504130f66d33

    • SHA256

      7096d59bcb168595ff5f95c7eb287ebe8de315f0af34b4d5c78a7363ae24cad5

    • SHA512

      30fc1d2fa65d826cfc055be59c729f3a697988830a8e7b9093c088969d43a29fc43798bde7639dc38236f30d40c510bd5502f83244674bbc33a425f3a2a177ca

    • SSDEEP

      6144:rS54Nvug0//LU31XygG+Ooyf5z7q3DACE2lq:rqKmX//O1Crou5zADbzq

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks