General

  • Target

    NLHybrid Fixer NEW.bat

  • Size

    291KB

  • Sample

    241112-haf2tsxbpb

  • MD5

    1fea40d9d1f41390edb7d9e52c4b33bf

  • SHA1

    e125f47d3575a28b507855c0c9a57b030a45d9a3

  • SHA256

    6f034eb0b11a9b60901ee3a5f1329ab44bec65519b178ee16d39b40ccad6d2f8

  • SHA512

    084d39f3f6edff152d35edec85a2795bef66cc30a98cfb89ba4b12bfec3ccaf1f3b97cf968245a41b76a0ff5bc0bf4f242b9937dbf3a6addaad41005cac0ce39

  • SSDEEP

    6144:0IA1KNGYo86ChkxOZyt7dTEe4dFVBOovjL+/MDYwbwGpxsB:0IAZYx6CnZyBhKdFOorJhl+

Malware Config

Extracted

Family

xworm

Version

5.0

C2

request-rapidly.gl.at.ply.gg:56303

Mutex

YN2uqOclkhFcLZBm

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    win64updater.exe

aes.plain

Targets

    • Target

      NLHybrid Fixer NEW.bat

    • Size

      291KB

    • MD5

      1fea40d9d1f41390edb7d9e52c4b33bf

    • SHA1

      e125f47d3575a28b507855c0c9a57b030a45d9a3

    • SHA256

      6f034eb0b11a9b60901ee3a5f1329ab44bec65519b178ee16d39b40ccad6d2f8

    • SHA512

      084d39f3f6edff152d35edec85a2795bef66cc30a98cfb89ba4b12bfec3ccaf1f3b97cf968245a41b76a0ff5bc0bf4f242b9937dbf3a6addaad41005cac0ce39

    • SSDEEP

      6144:0IA1KNGYo86ChkxOZyt7dTEe4dFVBOovjL+/MDYwbwGpxsB:0IAZYx6CnZyBhKdFOorJhl+

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks