General
-
Target
skibidi toilet.bat
-
Size
405KB
-
Sample
241202-c2hf3svmhy
-
MD5
5c9e99bce6940302fcd272f3f2ee4fbb
-
SHA1
b09e0e78ce4af3c4e0ef0e769ecb3417188d3f55
-
SHA256
60ddaf8d345c4fab6658466b51ceb48e63bf3d04fb76353ed18e42c069138ad7
-
SHA512
34e4e588497e886daf4531ef98702285a65e80a4b79752c9ca9eb57cf342ad19e594b1f579f197e8320c9a5a84f0888b053a1a4c01907e3ffd6688ab06bd9586
-
SSDEEP
6144:+z0aix6BLxnTI513uNOp/OOUkzGYvZBrRAIOP85qEon6CKjQHdm7mpktiPrcr9pK:ixlE51esp/DdZkI68VUPKcHUikwi9pK
Static task
static1
Behavioral task
behavioral1
Sample
skibidi toilet.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
194.59.30.229:7000
-
install_file
USB.exe
Targets
-
-
Target
skibidi toilet.bat
-
Size
405KB
-
MD5
5c9e99bce6940302fcd272f3f2ee4fbb
-
SHA1
b09e0e78ce4af3c4e0ef0e769ecb3417188d3f55
-
SHA256
60ddaf8d345c4fab6658466b51ceb48e63bf3d04fb76353ed18e42c069138ad7
-
SHA512
34e4e588497e886daf4531ef98702285a65e80a4b79752c9ca9eb57cf342ad19e594b1f579f197e8320c9a5a84f0888b053a1a4c01907e3ffd6688ab06bd9586
-
SSDEEP
6144:+z0aix6BLxnTI513uNOp/OOUkzGYvZBrRAIOP85qEon6CKjQHdm7mpktiPrcr9pK:ixlE51esp/DdZkI68VUPKcHUikwi9pK
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-