General
-
Target
rat.exe
-
Size
41KB
-
Sample
241120-t9nrhayhng
-
MD5
4f1165749ca148c4e5e1cc9668b77362
-
SHA1
59bc26664dc28a62583406c4a76ecc63e5868dc8
-
SHA256
3f72d384eb716a3fb5da70541e033e0dca76f2479d8c64c0087c8c9dc3c6148b
-
SHA512
610f4939228790155716ec3574838a6dd49a339dd669667fcd4a2dd552f3558c82ac3f51507b91ba7d26717007095114cfc5b313d6db93a6b10fe905869b7c5a
-
SSDEEP
768:8yIOKKVKWC6uzXvgggCLJF5PG9pmeX6vOwhT3Emzy:8zbKVKWLcXvvgcFI9AeX6vOwt9O
Behavioral task
behavioral1
Sample
rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rat.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
tcp://ikonik2681-35277.portmap.host:35277
E9ghqILQRlbkHiLe
-
Install_directory
%AppData%
-
install_file
$77MicrosoftDefender.exe
Targets
-
-
Target
rat.exe
-
Size
41KB
-
MD5
4f1165749ca148c4e5e1cc9668b77362
-
SHA1
59bc26664dc28a62583406c4a76ecc63e5868dc8
-
SHA256
3f72d384eb716a3fb5da70541e033e0dca76f2479d8c64c0087c8c9dc3c6148b
-
SHA512
610f4939228790155716ec3574838a6dd49a339dd669667fcd4a2dd552f3558c82ac3f51507b91ba7d26717007095114cfc5b313d6db93a6b10fe905869b7c5a
-
SSDEEP
768:8yIOKKVKWC6uzXvgggCLJF5PG9pmeX6vOwhT3Emzy:8zbKVKWLcXvvgcFI9AeX6vOwt9O
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1