General
-
Target
NLHybrid Fixer.bat
-
Size
291KB
-
Sample
241112-g14edazldl
-
MD5
734fdc5c211a7b1fe3a5101c3b0aafd6
-
SHA1
3d8b84678e674a5b4b49ad4ee4669179d16b75d0
-
SHA256
0682cfbf0f7c1425a627a847a7cfbc9d3c7633d8426b6f7800d81e391528167b
-
SHA512
92b2af4e5dbdeefdad102696b8b6d85c10c2885d0e1bfb3d9b94c0ef8e1dafa488f8c8688504b8cb76e244f6abcd3f093e817f5767ae16daed89f80fcbb1db18
-
SSDEEP
6144:uoiULBMXvSD+eFkX0TupDOYvaktWHHvdTNb71M943xw:uLULBM47FNuNOWaxvH7m43a
Static task
static1
Behavioral task
behavioral1
Sample
NLHybrid Fixer.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
NLHybrid Fixer.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
remote-newest.gl.at.ply.gg:62113
fund-scared.gl.at.ply.gg:62113
UrM5eoX12ULh6st6
-
Install_directory
%Userprofile%
-
install_file
win64updater.exe
Targets
-
-
Target
NLHybrid Fixer.bat
-
Size
291KB
-
MD5
734fdc5c211a7b1fe3a5101c3b0aafd6
-
SHA1
3d8b84678e674a5b4b49ad4ee4669179d16b75d0
-
SHA256
0682cfbf0f7c1425a627a847a7cfbc9d3c7633d8426b6f7800d81e391528167b
-
SHA512
92b2af4e5dbdeefdad102696b8b6d85c10c2885d0e1bfb3d9b94c0ef8e1dafa488f8c8688504b8cb76e244f6abcd3f093e817f5767ae16daed89f80fcbb1db18
-
SSDEEP
6144:uoiULBMXvSD+eFkX0TupDOYvaktWHHvdTNb71M943xw:uLULBM47FNuNOWaxvH7m43a
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1