General

  • Target

    NLHybrid Fixer.bat

  • Size

    547KB

  • Sample

    241113-fkb5hszkeq

  • MD5

    ebc28de1911149c52af8585a0823f441

  • SHA1

    d8744f6982b457ec03ce0a95ac720765abd5fa35

  • SHA256

    a3b90d67811ab8ac49544ec3aa8dc427bbbc4f1342ae024127d239b301872f96

  • SHA512

    6d3285a95833a36681bf27a4678655aa4d7ee23c03eb04dc134bdc7d34f3d9e33f439094cdc19c2c40994e5a472bff88aa58138a2b3822286b0db443daab4b80

  • SSDEEP

    12288:Zb0+A5aTifEeJ0v0FVYQgokImBWFNxHHEdUSiaxiNFHCy0K/PUTTbLCDfomBi:ZI+A5xrJ0mYQKMNNC38M7zTraZ8

Malware Config

Extracted

Family

xworm

Version

5.0

C2

request-rapidly.gl.at.ply.gg:56303

Mutex

YN2uqOclkhFcLZBm

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    win64updater.exe

aes.plain

Targets

    • Target

      NLHybrid Fixer.bat

    • Size

      547KB

    • MD5

      ebc28de1911149c52af8585a0823f441

    • SHA1

      d8744f6982b457ec03ce0a95ac720765abd5fa35

    • SHA256

      a3b90d67811ab8ac49544ec3aa8dc427bbbc4f1342ae024127d239b301872f96

    • SHA512

      6d3285a95833a36681bf27a4678655aa4d7ee23c03eb04dc134bdc7d34f3d9e33f439094cdc19c2c40994e5a472bff88aa58138a2b3822286b0db443daab4b80

    • SSDEEP

      12288:Zb0+A5aTifEeJ0v0FVYQgokImBWFNxHHEdUSiaxiNFHCy0K/PUTTbLCDfomBi:ZI+A5xrJ0mYQKMNNC38M7zTraZ8

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks