General
-
Target
rat remover.bat
-
Size
8KB
-
Sample
241121-yjh6jswjhs
-
MD5
37fa5465a015515ca2d1aec1265e50e2
-
SHA1
c70aab71cac4f51b51e1e9b796dac8d85109442f
-
SHA256
a5f72f5b6a80a798b398d9e0af0d06647ebd7af9d00a38213ec079b59820cad3
-
SHA512
95ac8955274885d368d8d338bd5bd3448bfb2191118258a2c806b550ac3d314f0a7ea2496d1c526ea3341d41ac0f34bdd8431b9e2051cbdc35199a05a3be0356
-
SSDEEP
96:ci4bPeGVlBbGV5FYAUdaIQe/0uscQGZ/nWuPloLe9maMBqeTBKAR4iWPMY+aBUAS:DoW77Shdsusc1l6aVh/y
Static task
static1
Behavioral task
behavioral1
Sample
rat remover.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rat remover.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
dllhoster.exe
-
pastebin_url
https://pastebin.com/raw/7dw5bmk3
Targets
-
-
Target
rat remover.bat
-
Size
8KB
-
MD5
37fa5465a015515ca2d1aec1265e50e2
-
SHA1
c70aab71cac4f51b51e1e9b796dac8d85109442f
-
SHA256
a5f72f5b6a80a798b398d9e0af0d06647ebd7af9d00a38213ec079b59820cad3
-
SHA512
95ac8955274885d368d8d338bd5bd3448bfb2191118258a2c806b550ac3d314f0a7ea2496d1c526ea3341d41ac0f34bdd8431b9e2051cbdc35199a05a3be0356
-
SSDEEP
96:ci4bPeGVlBbGV5FYAUdaIQe/0uscQGZ/nWuPloLe9maMBqeTBKAR4iWPMY+aBUAS:DoW77Shdsusc1l6aVh/y
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-