General
-
Target
win12.cmd
-
Size
3KB
-
Sample
241117-mlsbfsyaqk
-
MD5
c017186534dbc3d9a29f34d8925a4a96
-
SHA1
6bebafd5a50ddc96f9ede400c842b9c09ee8b38f
-
SHA256
d9d9750e2dca4abfb7eb23bb48dd0484b4a6e44ef970133fce40769f4308aa3f
-
SHA512
8b40346ba61af805a1ce91e68d9cba8e9451e629bfe84ca6ae3e4b6eaab28625e39bac73338e78ad98cfc56abd7f6b6b25467e0327970b6351e494c6524e48d6
Static task
static1
Behavioral task
behavioral1
Sample
win12.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
win12.cmd
Resource
win11-20241023-en
Malware Config
Extracted
http://172.245.20.209/win12.zip
Extracted
xworm
5.0
154.216.19.12:7000
NuXVPKhDBKHTLExY
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7991608689:AAFUN71TMgyF_fzKFz6tyyBijaijI3s82tk
Targets
-
-
Target
win12.cmd
-
Size
3KB
-
MD5
c017186534dbc3d9a29f34d8925a4a96
-
SHA1
6bebafd5a50ddc96f9ede400c842b9c09ee8b38f
-
SHA256
d9d9750e2dca4abfb7eb23bb48dd0484b4a6e44ef970133fce40769f4308aa3f
-
SHA512
8b40346ba61af805a1ce91e68d9cba8e9451e629bfe84ca6ae3e4b6eaab28625e39bac73338e78ad98cfc56abd7f6b6b25467e0327970b6351e494c6524e48d6
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
A potential corporate email address has been identified in the URL: FluxJacker@mrfluxdevNewCLient3E7ABBA4F1555BE44044UserNameAdminOSFullNameMicrosoftWindows11ProUSBFalseCPUIntelCoreProcessorBroadwellGPUMicrosoftBasicDisplayAdapterRAMErrorGroupFJv1snew
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3