General
-
Target
multitool.bat
-
Size
298KB
-
Sample
241118-ahevqssrds
-
MD5
18c5a8b94eb5c19cdd965fc9d4686a02
-
SHA1
ee67546afe31bcf09dc426955af03594cee62c0a
-
SHA256
8f6e309171ab8b968764573f9a0252d70b793d36d6fccf1d7eb3fce7763cb74a
-
SHA512
8b8e0bb6b8b7f9ff1ff75ead07f999b7bbba7fe787d2b731685cd539c76fef1dcf2461fc6be2be49660e352de051003266bb7f664d4d41bf8a2dff120543f1ec
-
SSDEEP
6144:mxdIea9oQDm/ParmLX7WrxDShuILbormGyOVYKBOc97:mxQNDm3ar6XqrxQHsr/xHBT
Static task
static1
Behavioral task
behavioral1
Sample
multitool.bat
Resource
win7-20240903-en
Malware Config
Extracted
xworm
85.209.133.220:111
-
Install_directory
%AppData%
-
install_file
system.exe
Targets
-
-
Target
multitool.bat
-
Size
298KB
-
MD5
18c5a8b94eb5c19cdd965fc9d4686a02
-
SHA1
ee67546afe31bcf09dc426955af03594cee62c0a
-
SHA256
8f6e309171ab8b968764573f9a0252d70b793d36d6fccf1d7eb3fce7763cb74a
-
SHA512
8b8e0bb6b8b7f9ff1ff75ead07f999b7bbba7fe787d2b731685cd539c76fef1dcf2461fc6be2be49660e352de051003266bb7f664d4d41bf8a2dff120543f1ec
-
SSDEEP
6144:mxdIea9oQDm/ParmLX7WrxDShuILbormGyOVYKBOc97:mxQNDm3ar6XqrxQHsr/xHBT
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-